Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-9776 (GCVE-0-2016-9776)
Vulnerability from cvelistv5 – Published: 2016-12-29 22:00 – Updated: 2024-08-06 02:59
VLAI?
EPSS
Summary
QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
7 references
| URL | Tags |
|---|---|
| https://lists.debian.org/debian-lts-announce/2018… | mailing-listx_refsource_MLIST |
| https://security.gentoo.org/glsa/201701-49 | vendor-advisoryx_refsource_GENTOO |
| http://www.openwall.com/lists/oss-security/2016/12/02/3 | mailing-listx_refsource_MLIST |
| http://www.openwall.com/lists/oss-security/2016/12/02/8 | mailing-listx_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=1400829 | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/94638 | vdb-entryx_refsource_BID |
| https://lists.gnu.org/archive/html/qemu-devel/201… | mailing-listx_refsource_MLIST |
Date Public ?
2016-11-30 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T02:59:03.469Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "GLSA-201701-49",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-49"
},
{
"name": "[oss-security] 20161202 CVE request Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"name": "[oss-security] 20161202 Re: CVE request Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
},
{
"name": "94638",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/94638"
},
{
"name": "[qemu-devel] 20161130 [PATCH] net: mcf: check receive buffer size register value",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-11-30T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-09-07T09:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "GLSA-201701-49",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-49"
},
{
"name": "[oss-security] 20161202 CVE request Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"name": "[oss-security] 20161202 Re: CVE request Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
},
{
"name": "94638",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/94638"
},
{
"name": "[qemu-devel] 20161130 [PATCH] net: mcf: check receive buffer size register value",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2016-9776",
"datePublished": "2016-12-29T22:00:00.000Z",
"dateReserved": "2016-12-02T00:00:00.000Z",
"dateUpdated": "2024-08-06T02:59:03.469Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-9776",
"date": "2026-05-19",
"epss": "0.00064",
"percentile": "0.19783"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.7.1\", \"matchCriteriaId\": \"F83E2010-6463-407A-928D-DB71A705A04C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:*\", \"matchCriteriaId\": \"58947AD5-A971-4E22-8D8A-634E2ED5DECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.8.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"62294521-D8AD-43C1-9B53-D75243DC9A5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.8.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"436470C3-919A-40F0-9813-A34CD8F7CF29\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.\"}, {\"lang\": \"es\", \"value\": \"QEMU (tambi\\u00e9n conocido como Quick Emulator) construido con el soporte de emulador ColdFire Fast Ethernet Controller es vulnerable a un problema de bucle infinito. Podr\\u00eda ocurrir mientras se reciben paquetes en \u0027mcf_fec_receive\u0027. Un usuario/proceso privilegiado dentro de hu\\u00e9sped podr\\u00eda utilizar este problema para bloquear el proceso QEMU en el host conduciendo a DoS.\"}]",
"id": "CVE-2016-9776",
"lastModified": "2024-11-21T03:01:43.793",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-12-29T22:59:00.510",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2016/12/02/3\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/12/02/8\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/94638\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1400829\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201701-49\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/12/02/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/12/02/8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/94638\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1400829\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201701-49\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-835\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-9776\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-12-29T22:59:00.510\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.\"},{\"lang\":\"es\",\"value\":\"QEMU (tambi\u00e9n conocido como Quick Emulator) construido con el soporte de emulador ColdFire Fast Ethernet Controller es vulnerable a un problema de bucle infinito. Podr\u00eda ocurrir mientras se reciben paquetes en \u0027mcf_fec_receive\u0027. Un usuario/proceso privilegiado dentro de hu\u00e9sped podr\u00eda utilizar este problema para bloquear el proceso QEMU en el host conduciendo a DoS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.1\",\"matchCriteriaId\":\"F83E2010-6463-407A-928D-DB71A705A04C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"58947AD5-A971-4E22-8D8A-634E2ED5DECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62294521-D8AD-43C1-9B53-D75243DC9A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"436470C3-919A-40F0-9813-A34CD8F7CF29\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2016/12/02/3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/12/02/8\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94638\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1400829\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-49\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/12/02/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/12/02/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94638\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1400829\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-49\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CNVD-2016-12017
Vulnerability from cnvd - Published: 2016-12-08
VLAI Severity ?
Title
QEMU '/hw/net/mcf_fec.c'拒绝服务漏洞
Description
QEMU(又名Quick Emulator)是法国程序员法布里斯-贝拉(Fabrice Bellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。
QEMU中的/hw/net/mcf_fec.c文件存在拒绝服务漏洞。攻击者可利用该漏洞造成拒绝服务(无限循环)。
Severity
中
Patch Name
QEMU '/hw/net/mcf_fec.c'拒绝服务漏洞的补丁
Patch Description
QEMU(又名Quick Emulator)是法国程序员法布里斯-贝拉(Fabrice Bellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。
QEMU中的/hw/net/mcf_fec.c文件存在拒绝服务漏洞。攻击者可利用该漏洞造成拒绝服务(无限循环)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html
Reference
http://www.securityfocus.com/bid/94638
Impacted products
| Name | QEMU QEMU |
|---|
{
"bids": {
"bid": {
"bidNumber": "94638"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-9776"
}
},
"description": "QEMU\uff08\u53c8\u540dQuick Emulator\uff09\u662f\u6cd5\u56fd\u7a0b\u5e8f\u5458\u6cd5\u5e03\u91cc\u65af-\u8d1d\u62c9\uff08Fabrice Bellard\uff09\u6240\u7814\u53d1\u7684\u4e00\u5957\u6a21\u62df\u5904\u7406\u5668\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u5177\u6709\u901f\u5ea6\u5feb\u3001\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002\r\n\r\nQEMU\u4e2d\u7684/hw/net/mcf_fec.c\u6587\u4ef6\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u65e0\u9650\u5faa\u73af\uff09\u3002",
"discovererName": "Wjjzhang (tencent.com).",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-12017",
"openTime": "2016-12-08",
"patchDescription": "QEMU\uff08\u53c8\u540dQuick Emulator\uff09\u662f\u6cd5\u56fd\u7a0b\u5e8f\u5458\u6cd5\u5e03\u91cc\u65af-\u8d1d\u62c9\uff08Fabrice Bellard\uff09\u6240\u7814\u53d1\u7684\u4e00\u5957\u6a21\u62df\u5904\u7406\u5668\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u5177\u6709\u901f\u5ea6\u5feb\u3001\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002\r\n\r\nQEMU\u4e2d\u7684/hw/net/mcf_fec.c\u6587\u4ef6\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u65e0\u9650\u5faa\u73af\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "QEMU \u0027/hw/net/mcf_fec.c\u0027\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "QEMU QEMU"
},
"referenceLink": "http://www.securityfocus.com/bid/94638",
"serverity": "\u4e2d",
"submitTime": "2016-12-07",
"title": "QEMU \u0027/hw/net/mcf_fec.c\u0027\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
FKIE_CVE-2016-9776
Vulnerability from fkie_nvd - Published: 2016-12-29 22:59 - Updated: 2026-05-06 22:30
Severity ?
Summary
QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F83E2010-6463-407A-928D-DB71A705A04C",
"versionEndIncluding": "2.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:*",
"matchCriteriaId": "58947AD5-A971-4E22-8D8A-634E2ED5DECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62294521-D8AD-43C1-9B53-D75243DC9A5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "436470C3-919A-40F0-9813-A34CD8F7CF29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS."
},
{
"lang": "es",
"value": "QEMU (tambi\u00e9n conocido como Quick Emulator) construido con el soporte de emulador ColdFire Fast Ethernet Controller es vulnerable a un problema de bucle infinito. Podr\u00eda ocurrir mientras se reciben paquetes en \u0027mcf_fec_receive\u0027. Un usuario/proceso privilegiado dentro de hu\u00e9sped podr\u00eda utilizar este problema para bloquear el proceso QEMU en el host conduciendo a DoS."
}
],
"id": "CVE-2016-9776",
"lastModified": "2026-05-06T22:30:45.220",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-12-29T22:59:00.510",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/94638"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201701-49"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/94638"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201701-49"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-52M2-JXVJ-QW6R
Vulnerability from github – Published: 2022-05-13 01:13 – Updated: 2022-05-13 01:13
VLAI?
Details
QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2016-9776"
],
"database_specific": {
"cwe_ids": [
"CWE-835"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-12-29T22:59:00Z",
"severity": "MODERATE"
},
"details": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"id": "GHSA-52m2-jxvj-qw6r",
"modified": "2022-05-13T01:13:40Z",
"published": "2022-05-13T01:13:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9776"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"type": "WEB",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201701-49"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/94638"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2016-9776
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-9776",
"description": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"id": "GSD-2016-9776",
"references": [
"https://www.suse.com/security/cve/CVE-2016-9776.html",
"https://ubuntu.com/security/CVE-2016-9776"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-9776"
],
"details": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"id": "GSD-2016-9776",
"modified": "2023-12-13T01:21:21.676053Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9776",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "https://security.gentoo.org/glsa/201701-49",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201701-49"
},
{
"name": "http://www.openwall.com/lists/oss-security/2016/12/02/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"name": "http://www.openwall.com/lists/oss-security/2016/12/02/8",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"name": "http://www.securityfocus.com/bid/94638",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/94638"
},
{
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.8.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.8.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9776"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[qemu-devel] 20161130 [PATCH] net: mcf: check receive buffer size register value",
"refsource": "MLIST",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400829"
},
{
"name": "94638",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/94638"
},
{
"name": "[oss-security] 20161202 Re: CVE request Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/8"
},
{
"name": "[oss-security] 20161202 CVE request Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/12/02/3"
},
{
"name": "GLSA-201701-49",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201701-49"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2020-11-10T18:45Z",
"publishedDate": "2016-12-29T22:59Z"
}
}
}
SUSE-SU-2017:0127-1
Vulnerability from csaf_suse - Published: 2017-01-13 15:30 - Updated: 2017-01-13 15:30Summary
Security update for qemu
Severity
Important
Notes
Title of the patch: Security update for qemu
Description of the patch:
qemu was updated to fix several issues.
These security issues were fixed:
- CVE-2016-9102: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number (bsc#1014256).
- CVE-2016-9103: The v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values writing to them (bsc#1007454).
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285).
- CVE-2016-9845: The Virtio GPU Device emulator support as vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1013767).
- CVE-2016-9846: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while updating the cursor data in update_cursor_data_virgl. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1013764).
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109).
- CVE-2016-9908: The Virtio GPU Device emulator support was vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1014514).
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111).
- CVE-2016-9912: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1014112).
- CVE-2016-9913: VirtFS was vulnerable to memory leakage issue via its '9p-handle' or '9p-proxy' backend drivers. A privileged user inside guest could have used this flaw to leak host memory, thus affecting other services on the host and/or potentially crash the Qemu process on the host (bsc#1014110).
These non-security issues were fixed:
- Fixed uint64 property parsing and add regression tests (bsc#937125)
- Added a man page for kvm_stat
- Fix crash in vte (bsc#1008519)
- Various upstream commits targeted towards stable releases (bsc#1013341)
Patchnames: SUSE-SLE-DESKTOP-12-SP2-2017-68,SUSE-SLE-RPI-12-SP2-2017-68,SUSE-SLE-SERVER-12-SP2-2017-68
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.5 (High)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
70 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nqemu was updated to fix several issues.\n\nThese security issues were fixed:\n\n- CVE-2016-9102: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number (bsc#1014256).\n- CVE-2016-9103: The v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values writing to them (bsc#1007454).\n- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285).\n- CVE-2016-9845: The Virtio GPU Device emulator support as vulnerable to an information leakage issue while processing the \u0027VIRTIO_GPU_CMD_GET_CAPSET_INFO\u0027 command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1013767).\n- CVE-2016-9846: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while updating the cursor data in update_cursor_data_virgl. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1013764).\n- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109).\n- CVE-2016-9908: The Virtio GPU Device emulator support was vulnerable to an information leakage issue while processing the \u0027VIRTIO_GPU_CMD_GET_CAPSET\u0027 command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1014514).\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111).\n- CVE-2016-9912: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while destroying gpu resource object in \u0027virtio_gpu_resource_destroy\u0027. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1014112).\n- CVE-2016-9913: VirtFS was vulnerable to memory leakage issue via its \u00279p-handle\u0027 or \u00279p-proxy\u0027 backend drivers. A privileged user inside guest could have used this flaw to leak host memory, thus affecting other services on the host and/or potentially crash the Qemu process on the host (bsc#1014110).\n\nThese non-security issues were fixed:\n\n- Fixed uint64 property parsing and add regression tests (bsc#937125)\n- Added a man page for kvm_stat\n- Fix crash in vte (bsc#1008519)\n- Various upstream commits targeted towards stable releases (bsc#1013341)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2017-68,SUSE-SLE-RPI-12-SP2-2017-68,SUSE-SLE-SERVER-12-SP2-2017-68",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0127-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0127-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170127-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0127-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html"
},
{
"category": "self",
"summary": "SUSE Bug 1007454",
"url": "https://bugzilla.suse.com/1007454"
},
{
"category": "self",
"summary": "SUSE Bug 1008519",
"url": "https://bugzilla.suse.com/1008519"
},
{
"category": "self",
"summary": "SUSE Bug 1009109",
"url": "https://bugzilla.suse.com/1009109"
},
{
"category": "self",
"summary": "SUSE Bug 1013285",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "self",
"summary": "SUSE Bug 1013341",
"url": "https://bugzilla.suse.com/1013341"
},
{
"category": "self",
"summary": "SUSE Bug 1013764",
"url": "https://bugzilla.suse.com/1013764"
},
{
"category": "self",
"summary": "SUSE Bug 1013767",
"url": "https://bugzilla.suse.com/1013767"
},
{
"category": "self",
"summary": "SUSE Bug 1014109",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "self",
"summary": "SUSE Bug 1014110",
"url": "https://bugzilla.suse.com/1014110"
},
{
"category": "self",
"summary": "SUSE Bug 1014111",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "self",
"summary": "SUSE Bug 1014112",
"url": "https://bugzilla.suse.com/1014112"
},
{
"category": "self",
"summary": "SUSE Bug 1014256",
"url": "https://bugzilla.suse.com/1014256"
},
{
"category": "self",
"summary": "SUSE Bug 1014514",
"url": "https://bugzilla.suse.com/1014514"
},
{
"category": "self",
"summary": "SUSE Bug 1016779",
"url": "https://bugzilla.suse.com/1016779"
},
{
"category": "self",
"summary": "SUSE Bug 937125",
"url": "https://bugzilla.suse.com/937125"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9102 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9103 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9381 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9776 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9845 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9846 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9908 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9911 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9912 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9913 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9922 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9922/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2017-01-13T15:30:43Z",
"generator": {
"date": "2017-01-13T15:30:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0127-1",
"initial_release_date": "2017-01-13T15:30:43Z",
"revision_history": [
{
"date": "2017-01-13T15:30:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-2.6.2-39.1.aarch64",
"product_id": "qemu-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-arm-2.6.2-39.1.aarch64",
"product_id": "qemu-arm-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-block-curl-2.6.2-39.1.aarch64",
"product_id": "qemu-block-curl-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.6.2-39.1.aarch64",
"product_id": "qemu-block-rbd-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.6.2-39.1.aarch64",
"product_id": "qemu-block-ssh-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.6.2-39.1.aarch64",
"product_id": "qemu-guest-agent-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-lang-2.6.2-39.1.aarch64",
"product_id": "qemu-lang-2.6.2-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-39.1.aarch64",
"product": {
"name": "qemu-tools-2.6.2-39.1.aarch64",
"product_id": "qemu-tools-2.6.2-39.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-39.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-39.1.noarch",
"product_id": "qemu-ipxe-1.0.0-39.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-39.1.noarch",
"product": {
"name": "qemu-seabios-1.9.1-39.1.noarch",
"product_id": "qemu-seabios-1.9.1-39.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-39.1.noarch",
"product": {
"name": "qemu-sgabios-8-39.1.noarch",
"product_id": "qemu-sgabios-8-39.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-39.1.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-39.1.noarch",
"product_id": "qemu-vgabios-1.9.1-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-2.6.2-39.1.ppc64le",
"product_id": "qemu-2.6.2-39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.6.2-39.1.ppc64le",
"product_id": "qemu-block-curl-2.6.2-39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.6.2-39.1.ppc64le",
"product_id": "qemu-block-ssh-2.6.2-39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.6.2-39.1.ppc64le",
"product_id": "qemu-guest-agent-2.6.2-39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-lang-2.6.2-39.1.ppc64le",
"product_id": "qemu-lang-2.6.2-39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-ppc-2.6.2-39.1.ppc64le",
"product_id": "qemu-ppc-2.6.2-39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-39.1.ppc64le",
"product": {
"name": "qemu-tools-2.6.2-39.1.ppc64le",
"product_id": "qemu-tools-2.6.2-39.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-39.1.s390x",
"product": {
"name": "qemu-2.6.2-39.1.s390x",
"product_id": "qemu-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-39.1.s390x",
"product": {
"name": "qemu-block-curl-2.6.2-39.1.s390x",
"product_id": "qemu-block-curl-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-39.1.s390x",
"product": {
"name": "qemu-block-ssh-2.6.2-39.1.s390x",
"product_id": "qemu-block-ssh-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-39.1.s390x",
"product": {
"name": "qemu-guest-agent-2.6.2-39.1.s390x",
"product_id": "qemu-guest-agent-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-39.1.s390x",
"product": {
"name": "qemu-kvm-2.6.2-39.1.s390x",
"product_id": "qemu-kvm-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-39.1.s390x",
"product": {
"name": "qemu-lang-2.6.2-39.1.s390x",
"product_id": "qemu-lang-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.6.2-39.1.s390x",
"product": {
"name": "qemu-s390-2.6.2-39.1.s390x",
"product_id": "qemu-s390-2.6.2-39.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-39.1.s390x",
"product": {
"name": "qemu-tools-2.6.2-39.1.s390x",
"product_id": "qemu-tools-2.6.2-39.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-2.6.2-39.1.x86_64",
"product_id": "qemu-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-39.1.x86_64",
"product_id": "qemu-block-curl-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-39.1.x86_64",
"product_id": "qemu-kvm-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-tools-2.6.2-39.1.x86_64",
"product_id": "qemu-tools-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-x86-2.6.2-39.1.x86_64",
"product_id": "qemu-x86-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-39.1.x86_64",
"product_id": "qemu-block-rbd-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-39.1.x86_64",
"product_id": "qemu-block-ssh-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-39.1.x86_64",
"product_id": "qemu-guest-agent-2.6.2-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-39.1.x86_64",
"product": {
"name": "qemu-lang-2.6.2-39.1.x86_64",
"product_id": "qemu-lang-2.6.2-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch"
},
"product_reference": "qemu-sgabios-8-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-39.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x"
},
"product_reference": "qemu-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-39.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-39.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-39.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch"
},
"product_reference": "qemu-sgabios-8-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-39.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x"
},
"product_reference": "qemu-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch"
},
"product_reference": "qemu-sgabios-8-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-9102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9102"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9102",
"url": "https://www.suse.com/security/cve/CVE-2016-9102"
},
{
"category": "external",
"summary": "SUSE Bug 1007450 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1007450"
},
{
"category": "external",
"summary": "SUSE Bug 1014256 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1014256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "moderate"
}
],
"title": "CVE-2016-9102"
},
{
"cve": "CVE-2016-9103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9103"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9103",
"url": "https://www.suse.com/security/cve/CVE-2016-9103"
},
{
"category": "external",
"summary": "SUSE Bug 1007454 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1007454"
},
{
"category": "external",
"summary": "SUSE Bug 1014259 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1014259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9103"
},
{
"cve": "CVE-2016-9381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9381"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9381",
"url": "https://www.suse.com/security/cve/CVE-2016-9381"
},
{
"category": "external",
"summary": "SUSE Bug 1009109 for CVE-2016-9381",
"url": "https://bugzilla.suse.com/1009109"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "important"
}
],
"title": "CVE-2016-9381"
},
{
"cve": "CVE-2016-9776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9776"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9776",
"url": "https://www.suse.com/security/cve/CVE-2016-9776"
},
{
"category": "external",
"summary": "SUSE Bug 1013285 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "external",
"summary": "SUSE Bug 1013657 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "external",
"summary": "SUSE Bug 1024182 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1024182"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9776"
},
{
"cve": "CVE-2016-9845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9845"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing \u0027VIRTIO_GPU_CMD_GET_CAPSET_INFO\u0027 command. A guest user/process could use this flaw to leak contents of the host memory bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9845",
"url": "https://www.suse.com/security/cve/CVE-2016-9845"
},
{
"category": "external",
"summary": "SUSE Bug 1013767 for CVE-2016-9845",
"url": "https://bugzilla.suse.com/1013767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9845"
},
{
"cve": "CVE-2016-9846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9846"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9846",
"url": "https://www.suse.com/security/cve/CVE-2016-9846"
},
{
"category": "external",
"summary": "SUSE Bug 1013764 for CVE-2016-9846",
"url": "https://bugzilla.suse.com/1013764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9846"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9908"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing \u0027VIRTIO_GPU_CMD_GET_CAPSET\u0027 command. A guest user/process could use this flaw to leak contents of the host memory bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9908",
"url": "https://www.suse.com/security/cve/CVE-2016-9908"
},
{
"category": "external",
"summary": "SUSE Bug 1014514 for CVE-2016-9908",
"url": "https://bugzilla.suse.com/1014514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9908"
},
{
"cve": "CVE-2016-9911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9911"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9911",
"url": "https://www.suse.com/security/cve/CVE-2016-9911"
},
{
"category": "external",
"summary": "SUSE Bug 1014111 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "external",
"summary": "SUSE Bug 1014507 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9911"
},
{
"cve": "CVE-2016-9912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9912"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in \u0027virtio_gpu_resource_destroy\u0027. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9912",
"url": "https://www.suse.com/security/cve/CVE-2016-9912"
},
{
"category": "external",
"summary": "SUSE Bug 1014112 for CVE-2016-9912",
"url": "https://bugzilla.suse.com/1014112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9912"
},
{
"cve": "CVE-2016-9913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9913"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9913",
"url": "https://www.suse.com/security/cve/CVE-2016-9913"
},
{
"category": "external",
"summary": "SUSE Bug 1014110 for CVE-2016-9913",
"url": "https://bugzilla.suse.com/1014110"
},
{
"category": "external",
"summary": "SUSE Bug 1014311 for CVE-2016-9913",
"url": "https://bugzilla.suse.com/1014311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "low"
}
],
"title": "CVE-2016-9913"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9922"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9922",
"url": "https://www.suse.com/security/cve/CVE-2016-9922"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-39.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-39.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-13T15:30:43Z",
"details": "moderate"
}
],
"title": "CVE-2016-9922"
}
]
}
SUSE-SU-2017:0570-1
Vulnerability from csaf_suse - Published: 2017-02-27 12:57 - Updated: 2017-02-27 12:57Summary
Security update for xen
Severity
Important
Notes
Title of the patch: Security update for xen
Description of the patch:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188).
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183).
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307).
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627).
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668).
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
These non-security issues were fixed:
- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
Patchnames: SUSE-SLE-DESKTOP-12-SP1-2017-297,SUSE-SLE-SDK-12-SP1-2017-297,SUSE-SLE-SERVER-12-SP1-2017-297
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.9 (Critical)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
78 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188).\n- CVE-2016-10155: The virtual hardware watchdog \u0027wdt_i6300esb\u0027 was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183).\n- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)\n- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186).\n- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307).\n- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)\n- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)\n- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627).\n- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)\n- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668).\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)\n\nThese non-security issues were fixed:\n\n- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3\n- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP1-2017-297,SUSE-SLE-SDK-12-SP1-2017-297,SUSE-SLE-SERVER-12-SP1-2017-297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0570-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0570-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170570-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0570-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000195",
"url": "https://bugzilla.suse.com/1000195"
},
{
"category": "self",
"summary": "SUSE Bug 1002496",
"url": "https://bugzilla.suse.com/1002496"
},
{
"category": "self",
"summary": "SUSE Bug 1013657",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "self",
"summary": "SUSE Bug 1013668",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "self",
"summary": "SUSE Bug 1014490",
"url": "https://bugzilla.suse.com/1014490"
},
{
"category": "self",
"summary": "SUSE Bug 1014507",
"url": "https://bugzilla.suse.com/1014507"
},
{
"category": "self",
"summary": "SUSE Bug 1015169",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "self",
"summary": "SUSE Bug 1016340",
"url": "https://bugzilla.suse.com/1016340"
},
{
"category": "self",
"summary": "SUSE Bug 1022627",
"url": "https://bugzilla.suse.com/1022627"
},
{
"category": "self",
"summary": "SUSE Bug 1022871",
"url": "https://bugzilla.suse.com/1022871"
},
{
"category": "self",
"summary": "SUSE Bug 1023004",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "self",
"summary": "SUSE Bug 1024183",
"url": "https://bugzilla.suse.com/1024183"
},
{
"category": "self",
"summary": "SUSE Bug 1024186",
"url": "https://bugzilla.suse.com/1024186"
},
{
"category": "self",
"summary": "SUSE Bug 1024307",
"url": "https://bugzilla.suse.com/1024307"
},
{
"category": "self",
"summary": "SUSE Bug 1024834",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "self",
"summary": "SUSE Bug 1025188",
"url": "https://bugzilla.suse.com/1025188"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9776 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9911 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9922 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5579 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5973 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5973/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2017-02-27T12:57:59Z",
"generator": {
"date": "2017-02-27T12:57:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0570-1",
"initial_release_date": "2017-02-27T12:57:59Z",
"revision_history": [
{
"date": "2017-02-27T12:57:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-4.5.5_06-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"product": {
"name": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"product_id": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-libs-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-libs-4.5.5_06-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-devel-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-devel-4.5.5_06-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-doc-html-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-doc-html-4.5.5_06-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-tools-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-tools-4.5.5_06-22.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"product": {
"name": "xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"product_id": "xen-tools-domU-4.5.5_06-22.11.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-libs-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-devel-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-libs-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-tools-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-libs-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-tools-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_06-22.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9776"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9776",
"url": "https://www.suse.com/security/cve/CVE-2016-9776"
},
{
"category": "external",
"summary": "SUSE Bug 1013285 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "external",
"summary": "SUSE Bug 1013657 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "external",
"summary": "SUSE Bug 1024182 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1024182"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "low"
}
],
"title": "CVE-2016-9776"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9911"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9911",
"url": "https://www.suse.com/security/cve/CVE-2016-9911"
},
{
"category": "external",
"summary": "SUSE Bug 1014111 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "external",
"summary": "SUSE Bug 1014507 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "low"
}
],
"title": "CVE-2016-9911"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9922"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9922",
"url": "https://www.suse.com/security/cve/CVE-2016-9922"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2016-9922"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-5579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5579"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5579",
"url": "https://www.suse.com/security/cve/CVE-2017-5579"
},
{
"category": "external",
"summary": "SUSE Bug 1021741 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1021741"
},
{
"category": "external",
"summary": "SUSE Bug 1022627 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1022627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "low"
}
],
"title": "CVE-2017-5579"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2017-5973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5973"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5973",
"url": "https://www.suse.com/security/cve/CVE-2017-5973"
},
{
"category": "external",
"summary": "SUSE Bug 1025109 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025109"
},
{
"category": "external",
"summary": "SUSE Bug 1025188 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_06-22.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.5_06-22.11.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-27T12:57:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-5973"
}
]
}
SUSE-SU-2017:0582-1
Vulnerability from csaf_suse - Published: 2017-02-28 10:34 - Updated: 2017-02-28 10:34Summary
Security update for xen
Severity
Important
Notes
Title of the patch: Security update for xen
Description of the patch:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805).
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
These non-security issues were fixed:
- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
Patchnames: SUSE-SLE-SAP-12-2017-299,SUSE-SLE-SERVER-12-2017-299
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.9 (Critical)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
84 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)\n- CVE-2016-10155: The virtual hardware watchdog \u0027wdt_i6300esb\u0027 was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)\n- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)\n- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)\n- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)\n- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)\n- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805).\n- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)\n- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)\n- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)\n- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)\n\nThese non-security issues were fixed:\n\n- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3\n- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2017-299,SUSE-SLE-SERVER-12-2017-299",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0582-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0582-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170582-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0582-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000195",
"url": "https://bugzilla.suse.com/1000195"
},
{
"category": "self",
"summary": "SUSE Bug 1002496",
"url": "https://bugzilla.suse.com/1002496"
},
{
"category": "self",
"summary": "SUSE Bug 1013657",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "self",
"summary": "SUSE Bug 1013668",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "self",
"summary": "SUSE Bug 1014490",
"url": "https://bugzilla.suse.com/1014490"
},
{
"category": "self",
"summary": "SUSE Bug 1014507",
"url": "https://bugzilla.suse.com/1014507"
},
{
"category": "self",
"summary": "SUSE Bug 1015169",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "self",
"summary": "SUSE Bug 1016340",
"url": "https://bugzilla.suse.com/1016340"
},
{
"category": "self",
"summary": "SUSE Bug 1022627",
"url": "https://bugzilla.suse.com/1022627"
},
{
"category": "self",
"summary": "SUSE Bug 1022871",
"url": "https://bugzilla.suse.com/1022871"
},
{
"category": "self",
"summary": "SUSE Bug 1023004",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "self",
"summary": "SUSE Bug 1024183",
"url": "https://bugzilla.suse.com/1024183"
},
{
"category": "self",
"summary": "SUSE Bug 1024186",
"url": "https://bugzilla.suse.com/1024186"
},
{
"category": "self",
"summary": "SUSE Bug 1024307",
"url": "https://bugzilla.suse.com/1024307"
},
{
"category": "self",
"summary": "SUSE Bug 1024834",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "self",
"summary": "SUSE Bug 1025188",
"url": "https://bugzilla.suse.com/1025188"
},
{
"category": "self",
"summary": "SUSE Bug 907805",
"url": "https://bugzilla.suse.com/907805"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9776 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9911 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9922 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5579 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5973 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5973/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2017-02-28T10:34:31Z",
"generator": {
"date": "2017-02-28T10:34:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0582-1",
"initial_release_date": "2017-02-28T10:34:31Z",
"revision_history": [
{
"date": "2017-02-28T10:34:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.4.4_14-22.33.1.x86_64",
"product": {
"name": "xen-4.4.4_14-22.33.1.x86_64",
"product_id": "xen-4.4.4_14-22.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_14-22.33.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_14-22.33.1.x86_64",
"product_id": "xen-doc-html-4.4.4_14-22.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_14-22.33.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_14-22.33.1.x86_64",
"product_id": "xen-libs-4.4.4_14-22.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_14-22.33.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_14-22.33.1.x86_64",
"product_id": "xen-tools-4.4.4_14-22.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_14-22.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_14-22.33.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8106"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8106",
"url": "https://www.suse.com/security/cve/CVE-2014-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 907805 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/907805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2014-8106"
},
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9776"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9776",
"url": "https://www.suse.com/security/cve/CVE-2016-9776"
},
{
"category": "external",
"summary": "SUSE Bug 1013285 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "external",
"summary": "SUSE Bug 1013657 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "external",
"summary": "SUSE Bug 1024182 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1024182"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "low"
}
],
"title": "CVE-2016-9776"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9911"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9911",
"url": "https://www.suse.com/security/cve/CVE-2016-9911"
},
{
"category": "external",
"summary": "SUSE Bug 1014111 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "external",
"summary": "SUSE Bug 1014507 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "low"
}
],
"title": "CVE-2016-9911"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9922"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9922",
"url": "https://www.suse.com/security/cve/CVE-2016-9922"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2016-9922"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-5579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5579"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5579",
"url": "https://www.suse.com/security/cve/CVE-2017-5579"
},
{
"category": "external",
"summary": "SUSE Bug 1021741 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1021741"
},
{
"category": "external",
"summary": "SUSE Bug 1022627 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1022627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "low"
}
],
"title": "CVE-2017-5579"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2017-5973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5973"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5973",
"url": "https://www.suse.com/security/cve/CVE-2017-5973"
},
{
"category": "external",
"summary": "SUSE Bug 1025109 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025109"
},
{
"category": "external",
"summary": "SUSE Bug 1025188 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_14-22.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_14-22.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-02-28T10:34:31Z",
"details": "moderate"
}
],
"title": "CVE-2017-5973"
}
]
}
SUSE-SU-2017:0647-1
Vulnerability from csaf_suse - Published: 2017-03-09 17:48 - Updated: 2017-03-09 17:48Summary
Security update for xen
Severity
Important
Notes
Title of the patch: Security update for xen
Description of the patch:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
These non-security issues were fixed:
- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#987002: Prevent crash of domU' after they were migrated from SP3 HV to SP4
Patchnames: sdksp4-xen-13019,slessp4-xen-13019
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.9 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
85 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)\n- CVE-2016-10155: The virtual hardware watchdog \u0027wdt_i6300esb\u0027 was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)\n- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)\n- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)\n- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)\n- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)\n- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)\n- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)\n- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)\n- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)\n- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)\n\nThese non-security issues were fixed:\n\n- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3\n- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd\n- bsc#987002: Prevent crash of domU\u0027 after they were migrated from SP3 HV to SP4\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-xen-13019,slessp4-xen-13019",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0647-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0647-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170647-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0647-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000195",
"url": "https://bugzilla.suse.com/1000195"
},
{
"category": "self",
"summary": "SUSE Bug 1002496",
"url": "https://bugzilla.suse.com/1002496"
},
{
"category": "self",
"summary": "SUSE Bug 1013657",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "self",
"summary": "SUSE Bug 1013668",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "self",
"summary": "SUSE Bug 1014490",
"url": "https://bugzilla.suse.com/1014490"
},
{
"category": "self",
"summary": "SUSE Bug 1014507",
"url": "https://bugzilla.suse.com/1014507"
},
{
"category": "self",
"summary": "SUSE Bug 1015169",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "self",
"summary": "SUSE Bug 1016340",
"url": "https://bugzilla.suse.com/1016340"
},
{
"category": "self",
"summary": "SUSE Bug 1022627",
"url": "https://bugzilla.suse.com/1022627"
},
{
"category": "self",
"summary": "SUSE Bug 1022871",
"url": "https://bugzilla.suse.com/1022871"
},
{
"category": "self",
"summary": "SUSE Bug 1023004",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "self",
"summary": "SUSE Bug 1024183",
"url": "https://bugzilla.suse.com/1024183"
},
{
"category": "self",
"summary": "SUSE Bug 1024186",
"url": "https://bugzilla.suse.com/1024186"
},
{
"category": "self",
"summary": "SUSE Bug 1024307",
"url": "https://bugzilla.suse.com/1024307"
},
{
"category": "self",
"summary": "SUSE Bug 1024834",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "self",
"summary": "SUSE Bug 1025188",
"url": "https://bugzilla.suse.com/1025188"
},
{
"category": "self",
"summary": "SUSE Bug 907805",
"url": "https://bugzilla.suse.com/907805"
},
{
"category": "self",
"summary": "SUSE Bug 987002",
"url": "https://bugzilla.suse.com/987002"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9776 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9911 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9922 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5579 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5973 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5973/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2017-03-09T17:48:38Z",
"generator": {
"date": "2017-03-09T17:48:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0647-1",
"initial_release_date": "2017-03-09T17:48:38Z",
"revision_history": [
{
"date": "2017-03-09T17:48:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_14-51.1.i586",
"product": {
"name": "xen-devel-4.4.4_14-51.1.i586",
"product_id": "xen-devel-4.4.4_14-51.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"product": {
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"product_id": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"product": {
"name": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"product_id": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_14-51.1.i586",
"product": {
"name": "xen-libs-4.4.4_14-51.1.i586",
"product_id": "xen-libs-4.4.4_14-51.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_14-51.1.i586",
"product": {
"name": "xen-tools-domU-4.4.4_14-51.1.i586",
"product_id": "xen-tools-domU-4.4.4_14-51.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-devel-4.4.4_14-51.1.x86_64",
"product_id": "xen-devel-4.4.4_14-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-4.4.4_14-51.1.x86_64",
"product_id": "xen-4.4.4_14-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_14-51.1.x86_64",
"product_id": "xen-doc-html-4.4.4_14-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_14-51.1.x86_64",
"product_id": "xen-libs-4.4.4_14-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_14-51.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_14-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_14-51.1.x86_64",
"product_id": "xen-tools-4.4.4_14-51.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_14-51.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_14-51.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_14-51.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_14-51.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586"
},
"product_reference": "xen-devel-4.4.4_14-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-devel-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586"
},
"product_reference": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_14-51.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586"
},
"product_reference": "xen-libs-4.4.4_14-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_14-51.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586"
},
"product_reference": "xen-tools-domU-4.4.4_14-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586"
},
"product_reference": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_14-51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586"
},
"product_reference": "xen-libs-4.4.4_14-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_14-51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586"
},
"product_reference": "xen-tools-domU-4.4.4_14-51.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_14-51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_14-51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8106"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8106",
"url": "https://www.suse.com/security/cve/CVE-2014-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 907805 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/907805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2014-8106"
},
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9776"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9776",
"url": "https://www.suse.com/security/cve/CVE-2016-9776"
},
{
"category": "external",
"summary": "SUSE Bug 1013285 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "external",
"summary": "SUSE Bug 1013657 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "external",
"summary": "SUSE Bug 1024182 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1024182"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "low"
}
],
"title": "CVE-2016-9776"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9911"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9911",
"url": "https://www.suse.com/security/cve/CVE-2016-9911"
},
{
"category": "external",
"summary": "SUSE Bug 1014111 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "external",
"summary": "SUSE Bug 1014507 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "low"
}
],
"title": "CVE-2016-9911"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9922"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9922",
"url": "https://www.suse.com/security/cve/CVE-2016-9922"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-9922"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-5579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5579"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5579",
"url": "https://www.suse.com/security/cve/CVE-2017-5579"
},
{
"category": "external",
"summary": "SUSE Bug 1021741 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1021741"
},
{
"category": "external",
"summary": "SUSE Bug 1022627 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1022627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "low"
}
],
"title": "CVE-2017-5579"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2017-5973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5973"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5973",
"url": "https://www.suse.com/security/cve/CVE-2017-5973"
},
{
"category": "external",
"summary": "SUSE Bug 1025109 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025109"
},
{
"category": "external",
"summary": "SUSE Bug 1025188 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_14_3.0.101_94-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_14_3.0.101_94-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_14-51.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_14-51.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-09T17:48:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-5973"
}
]
}
SUSE-SU-2017:0661-1
Vulnerability from csaf_suse - Published: 2017-03-10 16:05 - Updated: 2017-03-10 16:05Summary
Security update for qemu
Severity
Important
Notes
Title of the patch: Security update for qemu
Description of the patch:
This update for qemu fixes several issues.
These security issues were fixed:
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2017-5667: The SDHCI device emulation support was vulnerable to an OOB heap access issue allowing a privileged user inside the guest to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host (bsc#1022541)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)
- CVE-2016-10155: The i6300esb watchdog emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to leak memory on the host resulting in DoS (bnc#1021129)
These non-security issues were fixed:
- Fixed various inaccuracies in cirrus vga device emulation
- Fixed virtio interface failure (bsc#1015048)
- Fixed graphical update errors introduced by previous security fix (bsc#1016779)
Patchnames: SUSE-SLE-SAP-12-2017-366,SUSE-SLE-SERVER-12-2017-366
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.9 (Critical)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
37 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
65 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for qemu fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)\n- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)\n- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)\n- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)\n- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)\n- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)\n- CVE-2017-5667: The SDHCI device emulation support was vulnerable to an OOB heap access issue allowing a privileged user inside the guest to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host (bsc#1022541)\n- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)\n- CVE-2016-10155: The i6300esb watchdog emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to leak memory on the host resulting in DoS (bnc#1021129)\n\nThese non-security issues were fixed:\n\n- Fixed various inaccuracies in cirrus vga device emulation\n- Fixed virtio interface failure (bsc#1015048)\n- Fixed graphical update errors introduced by previous security fix (bsc#1016779)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2017-366,SUSE-SLE-SERVER-12-2017-366",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0661-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0661-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170661-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0661-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html"
},
{
"category": "self",
"summary": "SUSE Bug 1013285",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "self",
"summary": "SUSE Bug 1014109",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "self",
"summary": "SUSE Bug 1014111",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "self",
"summary": "SUSE Bug 1014702",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "self",
"summary": "SUSE Bug 1015048",
"url": "https://bugzilla.suse.com/1015048"
},
{
"category": "self",
"summary": "SUSE Bug 1015169",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "self",
"summary": "SUSE Bug 1016779",
"url": "https://bugzilla.suse.com/1016779"
},
{
"category": "self",
"summary": "SUSE Bug 1021129",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "self",
"summary": "SUSE Bug 1022541",
"url": "https://bugzilla.suse.com/1022541"
},
{
"category": "self",
"summary": "SUSE Bug 1023004",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "self",
"summary": "SUSE Bug 1023053",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "self",
"summary": "SUSE Bug 1023907",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "self",
"summary": "SUSE Bug 1024972",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9776 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9911 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9922 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5667 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2017-03-10T16:05:35Z",
"generator": {
"date": "2017-03-10T16:05:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0661-1",
"initial_release_date": "2017-03-10T16:05:35Z",
"revision_history": [
{
"date": "2017-03-10T16:05:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-48.31.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-48.31.1.noarch",
"product_id": "qemu-ipxe-1.0.0-48.31.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.7.4-48.31.1.noarch",
"product": {
"name": "qemu-seabios-1.7.4-48.31.1.noarch",
"product_id": "qemu-seabios-1.7.4-48.31.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-48.31.1.noarch",
"product": {
"name": "qemu-sgabios-8-48.31.1.noarch",
"product_id": "qemu-sgabios-8-48.31.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.7.4-48.31.1.noarch",
"product": {
"name": "qemu-vgabios-1.7.4-48.31.1.noarch",
"product_id": "qemu-vgabios-1.7.4-48.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.31.1.ppc64le",
"product": {
"name": "qemu-2.0.2-48.31.1.ppc64le",
"product_id": "qemu-2.0.2-48.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.31.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.0.2-48.31.1.ppc64le",
"product_id": "qemu-block-curl-2.0.2-48.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"product_id": "qemu-guest-agent-2.0.2-48.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.31.1.ppc64le",
"product": {
"name": "qemu-lang-2.0.2-48.31.1.ppc64le",
"product_id": "qemu-lang-2.0.2-48.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.0.2-48.31.1.ppc64le",
"product": {
"name": "qemu-ppc-2.0.2-48.31.1.ppc64le",
"product_id": "qemu-ppc-2.0.2-48.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.31.1.ppc64le",
"product": {
"name": "qemu-tools-2.0.2-48.31.1.ppc64le",
"product_id": "qemu-tools-2.0.2-48.31.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-2.0.2-48.31.1.s390x",
"product_id": "qemu-2.0.2-48.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-block-curl-2.0.2-48.31.1.s390x",
"product_id": "qemu-block-curl-2.0.2-48.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-guest-agent-2.0.2-48.31.1.s390x",
"product_id": "qemu-guest-agent-2.0.2-48.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-kvm-2.0.2-48.31.1.s390x",
"product_id": "qemu-kvm-2.0.2-48.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-lang-2.0.2-48.31.1.s390x",
"product_id": "qemu-lang-2.0.2-48.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-s390-2.0.2-48.31.1.s390x",
"product_id": "qemu-s390-2.0.2-48.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.31.1.s390x",
"product": {
"name": "qemu-tools-2.0.2-48.31.1.s390x",
"product_id": "qemu-tools-2.0.2-48.31.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-2.0.2-48.31.1.x86_64",
"product_id": "qemu-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-block-curl-2.0.2-48.31.1.x86_64",
"product_id": "qemu-block-curl-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.0.2-48.31.1.x86_64",
"product_id": "qemu-block-rbd-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.0.2-48.31.1.x86_64",
"product_id": "qemu-guest-agent-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-kvm-2.0.2-48.31.1.x86_64",
"product_id": "qemu-kvm-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-lang-2.0.2-48.31.1.x86_64",
"product_id": "qemu-lang-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-tools-2.0.2-48.31.1.x86_64",
"product_id": "qemu-tools-2.0.2-48.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.0.2-48.31.1.x86_64",
"product": {
"name": "qemu-x86-2.0.2-48.31.1.x86_64",
"product_id": "qemu-x86-2.0.2-48.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch"
},
"product_reference": "qemu-sgabios-8-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.31.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le"
},
"product_reference": "qemu-2.0.2-48.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.31.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.0.2-48.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-block-curl-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.31.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-guest-agent-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.31.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-kvm-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.31.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le"
},
"product_reference": "qemu-lang-2.0.2-48.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-lang-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.0.2-48.31.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le"
},
"product_reference": "qemu-ppc-2.0.2-48.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-s390-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.31.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.31.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch"
},
"product_reference": "qemu-sgabios-8-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.31.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le"
},
"product_reference": "qemu-tools-2.0.2-48.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.31.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x"
},
"product_reference": "qemu-tools-2.0.2-48.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.31.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.31.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-9776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9776"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9776",
"url": "https://www.suse.com/security/cve/CVE-2016-9776"
},
{
"category": "external",
"summary": "SUSE Bug 1013285 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "external",
"summary": "SUSE Bug 1013657 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "external",
"summary": "SUSE Bug 1024182 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1024182"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "low"
}
],
"title": "CVE-2016-9776"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9911"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9911",
"url": "https://www.suse.com/security/cve/CVE-2016-9911"
},
{
"category": "external",
"summary": "SUSE Bug 1014111 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "external",
"summary": "SUSE Bug 1014507 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "low"
}
],
"title": "CVE-2016-9911"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9922"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9922",
"url": "https://www.suse.com/security/cve/CVE-2016-9922"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2016-9922"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-5667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5667"
}
],
"notes": [
{
"category": "general",
"text": "The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5667",
"url": "https://www.suse.com/security/cve/CVE-2017-5667"
},
{
"category": "external",
"summary": "SUSE Bug 1022541 for CVE-2017-5667",
"url": "https://bugzilla.suse.com/1022541"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2017-5667"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-10T16:05:35Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
}
]
}
SUSE-SU-2017:0718-1
Vulnerability from csaf_suse - Published: 2017-03-17 07:43 - Updated: 2017-03-17 07:43Summary
Security update for xen
Severity
Important
Notes
Title of the patch: Security update for xen
Description of the patch:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340).
- CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a 'supposedly-ignored' operand size prefix (bsc#1012651).
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298)
This non-security issue was fixed:
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
Patchnames: sleclo50sp3-xen-13030,sleman21-xen-13030,slemap21-xen-13030,sleposp3-xen-13030,slessp3-xen-13030
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.8 (High)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.5 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.9 (Critical)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
71 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2016-10155: The virtual hardware watchdog \u0027wdt_i6300esb\u0027 was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)\n- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)\n- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)\n- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)\n- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340).\n- CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a \u0027supposedly-ignored\u0027 operand size prefix (bsc#1012651).\n- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)\n- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)\n- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298)\n\nThis non-security issue was fixed:\n\n- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleclo50sp3-xen-13030,sleman21-xen-13030,slemap21-xen-13030,sleposp3-xen-13030,slessp3-xen-13030",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0718-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0718-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170718-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0718-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html"
},
{
"category": "self",
"summary": "SUSE Bug 1002496",
"url": "https://bugzilla.suse.com/1002496"
},
{
"category": "self",
"summary": "SUSE Bug 1012651",
"url": "https://bugzilla.suse.com/1012651"
},
{
"category": "self",
"summary": "SUSE Bug 1013657",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "self",
"summary": "SUSE Bug 1013668",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "self",
"summary": "SUSE Bug 1014298",
"url": "https://bugzilla.suse.com/1014298"
},
{
"category": "self",
"summary": "SUSE Bug 1014507",
"url": "https://bugzilla.suse.com/1014507"
},
{
"category": "self",
"summary": "SUSE Bug 1015169",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "self",
"summary": "SUSE Bug 1016340",
"url": "https://bugzilla.suse.com/1016340"
},
{
"category": "self",
"summary": "SUSE Bug 1022871",
"url": "https://bugzilla.suse.com/1022871"
},
{
"category": "self",
"summary": "SUSE Bug 1023004",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "self",
"summary": "SUSE Bug 1024183",
"url": "https://bugzilla.suse.com/1024183"
},
{
"category": "self",
"summary": "SUSE Bug 1024834",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "self",
"summary": "SUSE Bug 907805",
"url": "https://bugzilla.suse.com/907805"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10013 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10024 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9776 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9911 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9922 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9932 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2017-03-17T07:43:02Z",
"generator": {
"date": "2017-03-17T07:43:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0718-1",
"initial_release_date": "2017-03-17T07:43:02Z",
"revision_history": [
{
"date": "2017-03-17T07:43:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"product": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-35.1.i586",
"product": {
"name": "xen-libs-4.2.5_21-35.1.i586",
"product_id": "xen-libs-4.2.5_21-35.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-35.1.i586",
"product": {
"name": "xen-tools-domU-4.2.5_21-35.1.i586",
"product_id": "xen-tools-domU-4.2.5_21-35.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-4.2.5_21-35.1.x86_64",
"product_id": "xen-4.2.5_21-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-doc-html-4.2.5_21-35.1.x86_64",
"product_id": "xen-doc-html-4.2.5_21-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-pdf-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-doc-pdf-4.2.5_21-35.1.x86_64",
"product_id": "xen-doc-pdf-4.2.5_21-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-libs-4.2.5_21-35.1.x86_64",
"product_id": "xen-libs-4.2.5_21-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.2.5_21-35.1.x86_64",
"product_id": "xen-libs-32bit-4.2.5_21-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-tools-4.2.5_21-35.1.x86_64",
"product_id": "xen-tools-4.2.5_21-35.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-35.1.x86_64",
"product": {
"name": "xen-tools-domU-4.2.5_21-35.1.x86_64",
"product_id": "xen-tools-domU-4.2.5_21-35.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 5",
"product": {
"name": "SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:cloud:5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager 2.1",
"product": {
"name": "SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:2.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 2.1",
"product": {
"name": "SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:2.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8106"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8106",
"url": "https://www.suse.com/security/cve/CVE-2014-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 907805 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/907805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2014-8106"
},
{
"cve": "CVE-2016-10013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10013"
}
],
"notes": [
{
"category": "general",
"text": "Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10013",
"url": "https://www.suse.com/security/cve/CVE-2016-10013"
},
{
"category": "external",
"summary": "SUSE Bug 1016340 for CVE-2016-10013",
"url": "https://bugzilla.suse.com/1016340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2016-10013"
},
{
"cve": "CVE-2016-10024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10024"
}
],
"notes": [
{
"category": "general",
"text": "Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10024",
"url": "https://www.suse.com/security/cve/CVE-2016-10024"
},
{
"category": "external",
"summary": "SUSE Bug 1014298 for CVE-2016-10024",
"url": "https://bugzilla.suse.com/1014298"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-10024",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2016-10024"
},
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9776"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in \u0027mcf_fec_receive\u0027. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9776",
"url": "https://www.suse.com/security/cve/CVE-2016-9776"
},
{
"category": "external",
"summary": "SUSE Bug 1013285 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013285"
},
{
"category": "external",
"summary": "SUSE Bug 1013657 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1013657"
},
{
"category": "external",
"summary": "SUSE Bug 1024182 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1024182"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9776",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "low"
}
],
"title": "CVE-2016-9776"
},
{
"cve": "CVE-2016-9911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9911"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in \u0027ehci_init_transfer\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9911",
"url": "https://www.suse.com/security/cve/CVE-2016-9911"
},
{
"category": "external",
"summary": "SUSE Bug 1014111 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014111"
},
{
"category": "external",
"summary": "SUSE Bug 1014507 for CVE-2016-9911",
"url": "https://bugzilla.suse.com/1014507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "low"
}
],
"title": "CVE-2016-9911"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9922"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9922",
"url": "https://www.suse.com/security/cve/CVE-2016-9922"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9922",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2016-9922"
},
{
"cve": "CVE-2016-9932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9932"
}
],
"notes": [
{
"category": "general",
"text": "CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a \"supposedly-ignored\" operand size prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9932",
"url": "https://www.suse.com/security/cve/CVE-2016-9932"
},
{
"category": "external",
"summary": "SUSE Bug 1012651 for CVE-2016-9932",
"url": "https://bugzilla.suse.com/1012651"
},
{
"category": "external",
"summary": "SUSE Bug 1016340 for CVE-2016-9932",
"url": "https://bugzilla.suse.com/1016340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "low"
}
],
"title": "CVE-2016-9932"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64",
"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T07:43:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…