<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2936-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-29T09:18:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-29T09:18:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-29T09:18:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for qemu fixes the following issues:

- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE12
- Change package post script udevadm trigger calls to be device
  specific (bsc#1002116)
- Address various security/stability issues
 * Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161 bsc#1001151)
 * Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
 * Fix DOS in Vmware pv scsi interface (CVE-2016-7421 bsc#999661)
 * Fix DOS in ColdFire Fast Ethernet Controller emulation
   (CVE-2016-7908 bsc#1002550)
 * Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
 * Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
 * Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
 * Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
 * Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
 * Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
 * Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
 * Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
 * Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
 * Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
 * Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
 * Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
 * Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
 * Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-2016-1719,SUSE-SLE-SERVER-12-2016-1719</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      <Description>Link for SUSE-SU-2016:2936-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2936-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1001151</URL>
      <Description>SUSE Bug 1001151</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1002116</URL>
      <Description>SUSE Bug 1002116</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1002550</URL>
      <Description>SUSE Bug 1002550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1002557</URL>
      <Description>SUSE Bug 1002557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003878</URL>
      <Description>SUSE Bug 1003878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003893</URL>
      <Description>SUSE Bug 1003893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003894</URL>
      <Description>SUSE Bug 1003894</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004702</URL>
      <Description>SUSE Bug 1004702</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004707</URL>
      <Description>SUSE Bug 1004707</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006536</URL>
      <Description>SUSE Bug 1006536</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006538</URL>
      <Description>SUSE Bug 1006538</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007391</URL>
      <Description>SUSE Bug 1007391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007450</URL>
      <Description>SUSE Bug 1007450</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007454</URL>
      <Description>SUSE Bug 1007454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007493</URL>
      <Description>SUSE Bug 1007493</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007494</URL>
      <Description>SUSE Bug 1007494</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007495</URL>
      <Description>SUSE Bug 1007495</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998516</URL>
      <Description>SUSE Bug 998516</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999661</URL>
      <Description>SUSE Bug 999661</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7161/</URL>
      <Description>SUSE CVE CVE-2016-7161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7170/</URL>
      <Description>SUSE CVE CVE-2016-7170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7421/</URL>
      <Description>SUSE CVE CVE-2016-7421 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7908/</URL>
      <Description>SUSE CVE CVE-2016-7908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7909/</URL>
      <Description>SUSE CVE CVE-2016-7909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8576/</URL>
      <Description>SUSE CVE CVE-2016-8576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8577/</URL>
      <Description>SUSE CVE CVE-2016-8577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8578/</URL>
      <Description>SUSE CVE CVE-2016-8578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8667/</URL>
      <Description>SUSE CVE CVE-2016-8667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8669/</URL>
      <Description>SUSE CVE CVE-2016-8669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8909/</URL>
      <Description>SUSE CVE CVE-2016-8909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8910/</URL>
      <Description>SUSE CVE CVE-2016-8910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9101/</URL>
      <Description>SUSE CVE CVE-2016-9101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9102/</URL>
      <Description>SUSE CVE CVE-2016-9102 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9103/</URL>
      <Description>SUSE CVE CVE-2016-9103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9104/</URL>
      <Description>SUSE CVE CVE-2016-9104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9105/</URL>
      <Description>SUSE CVE CVE-2016-9105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9106/</URL>
      <Description>SUSE CVE CVE-2016-9106 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-2.0.2-48.25.1">qemu-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-block-curl-2.0.2-48.25.1">qemu-block-curl-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-block-rbd-2.0.2-48.25.1">qemu-block-rbd-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-guest-agent-2.0.2-48.25.1">qemu-guest-agent-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0-48.25.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0-48.25.1">qemu-ipxe-1.0.0-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-kvm-2.0.2-48.25.1">qemu-kvm-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-lang-2.0.2-48.25.1">qemu-lang-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.7.4-48.25.1">
      <FullProductName ProductID="qemu-seabios-1.7.4-48.25.1">qemu-seabios-1.7.4-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-48.25.1">
      <FullProductName ProductID="qemu-sgabios-8-48.25.1">qemu-sgabios-8-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-tools-2.0.2-48.25.1">qemu-tools-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.7.4-48.25.1">
      <FullProductName ProductID="qemu-vgabios-1.7.4-48.25.1">qemu-vgabios-1.7.4-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-x86-2.0.2-48.25.1">qemu-x86-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-ppc-2.0.2-48.25.1">qemu-ppc-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.0.2-48.25.1">
      <FullProductName ProductID="qemu-s390-2.0.2-48.25.1">qemu-s390-2.0.2-48.25.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1">qemu-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1">qemu-block-curl-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1">qemu-block-rbd-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1">qemu-guest-agent-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1">qemu-ipxe-1.0.0-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1">qemu-kvm-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1">qemu-lang-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1">qemu-ppc-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1">qemu-s390-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.7.4-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1">qemu-seabios-1.7.4-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1">qemu-sgabios-8-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1">qemu-tools-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.7.4-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1">qemu-vgabios-1.7.4-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1">qemu-x86-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1">qemu-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1">qemu-block-curl-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1">qemu-block-rbd-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1">qemu-guest-agent-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1">qemu-ipxe-1.0.0-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1">qemu-kvm-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1">qemu-lang-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.7.4-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1">qemu-seabios-1.7.4-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1">qemu-sgabios-8-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1">qemu-tools-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.7.4-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1">qemu-vgabios-1.7.4-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.0.2-48.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1">qemu-x86-2.0.2-48.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.</Note>
    </Notes>
    <CVE>CVE-2016-7161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7161.html</URL>
        <Description>CVE-2016-7161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001151</URL>
        <Description>SUSE Bug 1001151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001152</URL>
        <Description>SUSE Bug 1001152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.</Note>
    </Notes>
    <CVE>CVE-2016-7170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7170.html</URL>
        <Description>CVE-2016-7170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998516</URL>
        <Description>SUSE Bug 998516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.</Note>
    </Notes>
    <CVE>CVE-2016-7421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7421.html</URL>
        <Description>CVE-2016-7421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999661</URL>
        <Description>SUSE Bug 999661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7908.html</URL>
        <Description>CVE-2016-7908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002550</URL>
        <Description>SUSE Bug 1002550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003030</URL>
        <Description>SUSE Bug 1003030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.</Note>
    </Notes>
    <CVE>CVE-2016-7909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7909.html</URL>
        <Description>CVE-2016-7909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002557</URL>
        <Description>SUSE Bug 1002557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003032</URL>
        <Description>SUSE Bug 1003032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.</Note>
    </Notes>
    <CVE>CVE-2016-8576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8576.html</URL>
        <Description>CVE-2016-8576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003878</URL>
        <Description>SUSE Bug 1003878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004016</URL>
        <Description>SUSE Bug 1004016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.</Note>
    </Notes>
    <CVE>CVE-2016-8577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8577.html</URL>
        <Description>CVE-2016-8577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003893</URL>
        <Description>SUSE Bug 1003893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004021</URL>
        <Description>SUSE Bug 1004021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.</Note>
    </Notes>
    <CVE>CVE-2016-8578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8578.html</URL>
        <Description>CVE-2016-8578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003894</URL>
        <Description>SUSE Bug 1003894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004023</URL>
        <Description>SUSE Bug 1004023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.</Note>
    </Notes>
    <CVE>CVE-2016-8667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8667.html</URL>
        <Description>CVE-2016-8667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004702</URL>
        <Description>SUSE Bug 1004702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005004</URL>
        <Description>SUSE Bug 1005004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.</Note>
    </Notes>
    <CVE>CVE-2016-8669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8669.html</URL>
        <Description>CVE-2016-8669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004707</URL>
        <Description>SUSE Bug 1004707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005005</URL>
        <Description>SUSE Bug 1005005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.</Note>
    </Notes>
    <CVE>CVE-2016-8909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8909.html</URL>
        <Description>CVE-2016-8909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006536</URL>
        <Description>SUSE Bug 1006536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007160</URL>
        <Description>SUSE Bug 1007160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.</Note>
    </Notes>
    <CVE>CVE-2016-8910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8910.html</URL>
        <Description>CVE-2016-8910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006538</URL>
        <Description>SUSE Bug 1006538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007157</URL>
        <Description>SUSE Bug 1007157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024178</URL>
        <Description>SUSE Bug 1024178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.</Note>
    </Notes>
    <CVE>CVE-2016-9101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9101.html</URL>
        <Description>CVE-2016-9101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007391</URL>
        <Description>SUSE Bug 1007391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013668</URL>
        <Description>SUSE Bug 1013668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024181</URL>
        <Description>SUSE Bug 1024181</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.</Note>
    </Notes>
    <CVE>CVE-2016-9102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9102.html</URL>
        <Description>CVE-2016-9102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007450</URL>
        <Description>SUSE Bug 1007450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014256</URL>
        <Description>SUSE Bug 1014256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.</Note>
    </Notes>
    <CVE>CVE-2016-9103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9103.html</URL>
        <Description>CVE-2016-9103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007454</URL>
        <Description>SUSE Bug 1007454</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014259</URL>
        <Description>SUSE Bug 1014259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.</Note>
    </Notes>
    <CVE>CVE-2016-9104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9104.html</URL>
        <Description>CVE-2016-9104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007493</URL>
        <Description>SUSE Bug 1007493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014297</URL>
        <Description>SUSE Bug 1014297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034990</URL>
        <Description>SUSE Bug 1034990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.</Note>
    </Notes>
    <CVE>CVE-2016-9105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9105.html</URL>
        <Description>CVE-2016-9105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007494</URL>
        <Description>SUSE Bug 1007494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014279</URL>
        <Description>SUSE Bug 1014279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.</Note>
    </Notes>
    <CVE>CVE-2016-9106</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162936-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9106.html</URL>
        <Description>CVE-2016-9106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007495</URL>
        <Description>SUSE Bug 1007495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014299</URL>
        <Description>SUSE Bug 1014299</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
