<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1403-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-05-16T09:23:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-05-16T09:23:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-05-16T09:23:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

  The included README has details about the impact of this change (bsc#1120095)

- Fixes in Live migrating PV domUs

  An earlier change broke live migration of PV domUs without a device
  model. The migration would stall for 10 seconds while the domU was
  paused, which caused network connections to drop.  Fix this by tracking
  the need for a device model within libxl. (bsc#1079730, bsc#1098403, bsc#1111025)

- Libvirt segfault when crash triggered on top of HVM guest (bsc#1120067)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1403</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1403-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1027519</URL>
      <Description>SUSE Bug 1027519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1079730</URL>
      <Description>SUSE Bug 1079730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098403</URL>
      <Description>SUSE Bug 1098403</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111025</URL>
      <Description>SUSE Bug 1111025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111331</URL>
      <Description>SUSE Bug 1111331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120067</URL>
      <Description>SUSE Bug 1120067</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120095</URL>
      <Description>SUSE Bug 1120095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12126/</URL>
      <Description>SUSE CVE CVE-2018-12126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12127/</URL>
      <Description>SUSE CVE CVE-2018-12127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12130/</URL>
      <Description>SUSE CVE CVE-2018-12130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11091/</URL>
      <Description>SUSE CVE CVE-2019-11091 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-4.10.3_04-lp150.2.19.1">xen-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-devel-4.10.3_04-lp150.2.19.1">xen-devel-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-doc-html-4.10.3_04-lp150.2.19.1">xen-doc-html-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-libs-4.10.3_04-lp150.2.19.1">xen-libs-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-libs-32bit-4.10.3_04-lp150.2.19.1">xen-libs-32bit-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-tools-4.10.3_04-lp150.2.19.1">xen-tools-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.10.3_04-lp150.2.19.1">
      <FullProductName ProductID="xen-tools-domU-4.10.3_04-lp150.2.19.1">xen-tools-domU-4.10.3_04-lp150.2.19.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-4.10.3_04-lp150.2.19.1">xen-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-devel-4.10.3_04-lp150.2.19.1">xen-devel-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-doc-html-4.10.3_04-lp150.2.19.1">xen-doc-html-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-libs-4.10.3_04-lp150.2.19.1">xen-libs-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-libs-32bit-4.10.3_04-lp150.2.19.1">xen-libs-32bit-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-tools-4.10.3_04-lp150.2.19.1">xen-tools-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.10.3_04-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:xen-tools-domU-4.10.3_04-lp150.2.19.1">xen-tools-domU-4.10.3_04-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:xen-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-devel-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-doc-html-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-32bit-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-domU-4.10.3_04-lp150.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12126.html</URL>
        <Description>CVE-2018-12126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135524</URL>
        <Description>SUSE Bug 1135524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149729</URL>
        <Description>SUSE Bug 1149729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:xen-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-devel-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-doc-html-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-32bit-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-domU-4.10.3_04-lp150.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12127.html</URL>
        <Description>CVE-2018-12127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:xen-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-devel-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-doc-html-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-32bit-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-domU-4.10.3_04-lp150.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12130.html</URL>
        <Description>CVE-2018-12130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2019-11091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:xen-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-devel-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-doc-html-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-32bit-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-libs-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-4.10.3_04-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:xen-tools-domU-4.10.3_04-lp150.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11091.html</URL>
        <Description>CVE-2019-11091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133319</URL>
        <Description>SUSE Bug 1133319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135394</URL>
        <Description>SUSE Bug 1135394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138043</URL>
        <Description>SUSE Bug 1138043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
