<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for virtualbox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2935-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-28T17:37:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-28T17:37:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-28T17:37:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for virtualbox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for virtualbox fixes the following issues:

- Fixes CVE-2016-5501,CVE-2016-5538,CVE-2016-5605,CVE-2016-5608,CVE-2016-5610,CVE-2016-5611,CVE-2016-5613
  (bsc#1005621)
- Add patch to limit number of simultaneous make jobs.
- Version bump to 5.1.8 (released 2016-10-18 by Oracle)
This is a maintenance release. The following items were fixed and/or added:
    GUI: fixed keyboard shortcut handling regressions (Mac OS X hosts only; bugs #15937 and #15938)
    GUI: fixed keyboard handling regression for separate UI (Windows hosts only; bugs #15928)
    NAT: don't exceed the maximum number of 'search' suffixes. Patch from bug #15948.
    NAT: fixed parsing of port-forwarding rules with a name which contains a slash (bug #16002)
    NAT Network: when the host has only loopback nameserver that cannot be mapped to the guests (e.g. dnsmasq running on 127.0.1.1), make DHCP supply NAT Network DNS proxy as nameserver.
    Bridged Network: prevent flooding syslog with packet allocation error messages (bug #15569)
    Audio: now using Audio Queues on Mac OS X hosts
    Audio: fixed recording with the PulseAudio backend (5.1 regression)
    Audio: various bugfixes
    Snapshots: fixed regression in 5.1.4 for deleting snapshots with several disks (bug #15831)
    Snapshots: crash fix and better error reporting when snapshot deletion failed
    Storage: some fixes for the NVMe emulation with Windows guests
    API: fixed initialization of SAS controllers (bug #15972)
    Build system: make it possible to build VBox on systems which default to Python 3
    Windows Additions / VGA: if the guest's power management turns a virtual screen off, blank the corresponding VM window rather than hide the window
    Windows Additions: fixed a generic bug which could lead to freezing shared folders (bug #15662)
    Linux hosts / guests: fix for kernels with CONFIG_CPUMASK_OFFSTACK set (bug #16020)
    Linux Additions: don't require all virtual consoles be in text mode. This should fix cases when the guest is booted with a graphical boot screen (bug #15683)
    Linux Additions: added depmod overrides for the vboxguest and vboxsf kernel modules to fix conflicts with modules shipped by certain Linux distributions
    X11 Additions: disable 3D on the guest if the host does not provide enough capabilities (bug #15860) 

- Builds keep running out of memory when building the web server part of the package.
  To help the memory pressure, I have forced make to run with '-j2', rather than use
  the number of processors. Such a change will slow the build, but will result in a
  higher rate of success.

-  Increase memory allowed in build to 10000 MB.

- Remove file 'fix_removal_of_DEFINE_PCI_DEVICE_TABLE' - fixed upstream.
- Version bump to 5.1.6 (released 2016-09-12 by Oracle)
This is a maintenance release. The following items were fixed and/or added:
    GUI: fixed issue with opening '.vbox' files and it's aliases
    GUI: keyboard grabbing fixes (bugs #15771 and #15745)
    GUI: fix for passing through Ctrl + mouse-click (Mac OS X hosts only; bug #15714)
    GUI: fixed automatic deletion of extension pack files (bugs #11352 and #14742)
    USB: fixed showing unknown device instead of the manufacturer or product description under certain circumstances (5.1.0 regression; bug #15764)
    XHCI: another fix for a hanging guest under certain conditions as result of the fix for bug #15747, this time for Windows 7 guests
    Serial: fixed high CPU usage with certain USB to serial converters on Linux hosts (bug #7796)
    Storage: fixed attaching stream optimized VMDK images (bug #14764)
    Storage: reject image variants which are unsupported by the backend (bug #7227)
    Storage: fixed loading saved states created with VirtualBox 5.0.10 and older when using a SCSI controller (bug #15865)
    Storage: fixed broken NVMe emulation if the host I/O cache setting is enabled
    Storage: fixed using multiple NVMe controllers if ICH9 is used
    NVMe: fixed a crash during reset which could happen under certain circumstances
    Audio: fixed microphone input (5.1.2 regression; bugs #14386 and #15802)
    Audio: fixed crashes under certain conditions (5.1.0 regression; bug #15887 and others)
    Audio: fixed recording with the ALSA backend (5.1 regression)
    Audio: fixed stream access mode with OSS backend (5.1 regression, thanks to Jung-uk Kim)
    E1000: do also return masked bits when reading the ICR register, this fixes booting from iPXE (5.1.2 regression; bug #15846)
    BIOS: fixed 4bpp scanline calculation (bug #15787)
    API: relax the check for the version attribute in OVF/OVA appliances (bug #15856)
    Windows hosts: fixed crashes when terminating the VM selector or other VBox COM clients (bug #15726 and others)
    Linux Installer: fixed path to the documentation in .rpm packages (5.1.0 regression)
    Linux Installer: fixed the vboxdrv.sh script to prevent an SELinux complaint (bug #15816)
    Linux hosts: don't use 32-bit legacy capabilities
    Linux Additions: Linux 4.8 fix for the kernel display driver (bugs #15890 and #15896)
    Linux Additions: don't load the kernel modules provided by the Linux distribution but load the kernel modules from the official Guest Additions package instead (bug #15324)
    Linux Additions: fix dynamic resizing problems in recent Linux guests (bug #15875)
    User Manual: fixed error in the VBoxManage chapter for the getextradata enumerate example (bug #15862) 

- Add file 'fix_removal_of_DEFINE_PCI_DEVICE_TABLE' to compile on kernel 4.8.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2935-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python-virtualbox-5.1.8-3.3">
      <FullProductName ProductID="python-virtualbox-5.1.8-3.3">python-virtualbox-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-5.1.8-3.3">virtualbox-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-devel-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-devel-5.1.8-3.3">virtualbox-devel-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-desktop-icons-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-guest-desktop-icons-5.1.8-3.3">virtualbox-guest-desktop-icons-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3">
      <FullProductName ProductID="virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3">virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-tools-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-guest-tools-5.1.8-3.3">virtualbox-guest-tools-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-x11-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-guest-x11-5.1.8-3.3">virtualbox-guest-x11-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3">
      <FullProductName ProductID="virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3">virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-source-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-host-source-5.1.8-3.3">virtualbox-host-source-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-qt-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-qt-5.1.8-3.3">virtualbox-qt-5.1.8-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-websrv-5.1.8-3.3">
      <FullProductName ProductID="virtualbox-websrv-5.1.8-3.3">virtualbox-websrv-5.1.8-3.3</FullProductName>
    </Branch>
    <Relationship ProductReference="python-virtualbox-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3">python-virtualbox-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-5.1.8-3.3">virtualbox-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-devel-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3">virtualbox-devel-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-desktop-icons-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3">virtualbox-guest-desktop-icons-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3">virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-tools-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3">virtualbox-guest-tools-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-x11-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3">virtualbox-guest-x11-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3">virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-host-source-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3">virtualbox-host-source-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-qt-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3">virtualbox-qt-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-websrv-5.1.8-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3">virtualbox-websrv-5.1.8-3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5538.</Note>
    </Notes>
    <CVE>CVE-2016-5501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5501.html</URL>
        <Description>CVE-2016-5501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5501.</Note>
    </Notes>
    <CVE>CVE-2016-5538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5538.html</URL>
        <Description>CVE-2016-5538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.1.4 in Oracle Virtualization allows remote attackers to affect confidentiality and integrity via vectors related to VRDE.</Note>
    </Notes>
    <CVE>CVE-2016-5605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5605.html</URL>
        <Description>CVE-2016-5605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect availability via vectors related to Core, a different vulnerability than CVE-2016-5613.</Note>
    </Notes>
    <CVE>CVE-2016-5608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5608.html</URL>
        <Description>CVE-2016-5608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core.</Note>
    </Notes>
    <CVE>CVE-2016-5610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5610.html</URL>
        <Description>CVE-2016-5610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality via vectors related to Core.</Note>
    </Notes>
    <CVE>CVE-2016-5611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5611.html</URL>
        <Description>CVE-2016-5611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect availability via vectors related to Core, a different vulnerability than CVE-2016-5608.</Note>
    </Notes>
    <CVE>CVE-2016-5613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:python-virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-devel-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-desktop-icons-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-tools-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-guest-x11-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-kmp-default-5.1.8_k4.4.27_2-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-host-source-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-qt-5.1.8-3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:virtualbox-websrv-5.1.8-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00121.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5613.html</URL>
        <Description>CVE-2016-5613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005621</URL>
        <Description>SUSE Bug 1005621</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
