<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3237-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-22T09:57:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-22T09:57:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-22T09:57:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu to version 2.6.2 fixes the several issues.

These security issues were fixed:
- CVE-2016-7161: Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allowed attackers to execute arbitrary code on the QEMU host via a large ethlite packet (bsc#1001151).
- CVE-2016-7170: OOB stack memory access when processing svga command (bsc#998516).
- CVE-2016-7466: xhci memory leakage during device unplug (bsc#1000345).
- CVE-2016-7422: NULL pointer dereference in virtqueu_map_desc (bsc#1000346).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1002550).
- CVE-2016-7995: Memory leak in ehci_process_itd (bsc#1003612).
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1003878).
- CVE-2016-8578: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation (bsc#1003894).
- CVE-2016-9105: Memory leakage in v9fs_link (bsc#1007494).
- CVE-2016-8577: Memory leak in the v9fs_read function in hw/9pfs/9p.c allowed local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation (bsc#1003893).
- CVE-2016-9106: Memory leakage in v9fs_write (bsc#1007495).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1004707).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002557).
- CVE-2016-9101: eepro100 memory leakage whern unplugging a device (bsc#1007391).
- CVE-2016-8668: The rocker_io_writel function in hw/net/rocker/rocker.c allowed local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size (bsc#1004706).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1006538).
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1006536).
- CVE-2016-7994: Memory leak in virtio_gpu_resource_create_2d (bsc#1003613).
- CVE-2016-9104: Integer overflow leading to OOB access in 9pfs (bsc#1007493).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1004702).
- CVE-2016-7907: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002549).

These non-security issues were fixed:
- Change kvm-supported.txt to be per-architecture documentation, stored in the
  package documentation directory of each per-arch package (bsc#1005353).
- Update support doc to include current ARM64 (AArch64) support stance (bsc#1005374).
- Fix migration failure when snapshot also has been done (bsc#1008148).
- Change package post script udevadm trigger calls to be device specific (bsc#1002116).
- Add qmp-commands.txt documentation file back in. It was inadvertently dropped.
- Add an x86 cpu option (l3-cache) to specify that an L3 cache is present and
  another option (cpuid-0xb) to enable the cpuid 0xb leaf (bsc#1007769).

This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3237-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.6.2-23.1">
      <FullProductName ProductID="qemu-2.6.2-23.1">qemu-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.6.2-23.1">
      <FullProductName ProductID="qemu-arm-2.6.2-23.1">qemu-arm-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.6.2-23.1">
      <FullProductName ProductID="qemu-block-curl-2.6.2-23.1">qemu-block-curl-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.6.2-23.1">
      <FullProductName ProductID="qemu-block-dmg-2.6.2-23.1">qemu-block-dmg-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.6.2-23.1">
      <FullProductName ProductID="qemu-block-iscsi-2.6.2-23.1">qemu-block-iscsi-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.6.2-23.1">
      <FullProductName ProductID="qemu-block-rbd-2.6.2-23.1">qemu-block-rbd-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.6.2-23.1">
      <FullProductName ProductID="qemu-block-ssh-2.6.2-23.1">qemu-block-ssh-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.6.2-23.1">
      <FullProductName ProductID="qemu-extra-2.6.2-23.1">qemu-extra-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.6.2-23.1">
      <FullProductName ProductID="qemu-guest-agent-2.6.2-23.1">qemu-guest-agent-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0-23.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0-23.1">qemu-ipxe-1.0.0-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.6.2-23.1">
      <FullProductName ProductID="qemu-kvm-2.6.2-23.1">qemu-kvm-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.6.2-23.1">
      <FullProductName ProductID="qemu-lang-2.6.2-23.1">qemu-lang-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-2.6.2-23.1">
      <FullProductName ProductID="qemu-linux-user-2.6.2-23.1">qemu-linux-user-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.6.2-23.1">
      <FullProductName ProductID="qemu-ppc-2.6.2-23.1">qemu-ppc-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.6.2-23.1">
      <FullProductName ProductID="qemu-s390-2.6.2-23.1">qemu-s390-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.9.1-23.1">
      <FullProductName ProductID="qemu-seabios-1.9.1-23.1">qemu-seabios-1.9.1-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-23.1">
      <FullProductName ProductID="qemu-sgabios-8-23.1">qemu-sgabios-8-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-2.6.2-23.1">
      <FullProductName ProductID="qemu-testsuite-2.6.2-23.1">qemu-testsuite-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.6.2-23.1">
      <FullProductName ProductID="qemu-tools-2.6.2-23.1">qemu-tools-2.6.2-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.9.1-23.1">
      <FullProductName ProductID="qemu-vgabios-1.9.1-23.1">qemu-vgabios-1.9.1-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.6.2-23.1">
      <FullProductName ProductID="qemu-x86-2.6.2-23.1">qemu-x86-2.6.2-23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-2.6.2-23.1">qemu-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-arm-2.6.2-23.1">qemu-arm-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1">qemu-block-curl-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1">qemu-block-dmg-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1">qemu-block-iscsi-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1">qemu-block-rbd-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1">qemu-block-ssh-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-extra-2.6.2-23.1">qemu-extra-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1">qemu-guest-agent-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1">qemu-ipxe-1.0.0-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1">qemu-kvm-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-lang-2.6.2-23.1">qemu-lang-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-linux-user-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1">qemu-linux-user-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1">qemu-ppc-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-s390-2.6.2-23.1">qemu-s390-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.9.1-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1">qemu-seabios-1.9.1-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-sgabios-8-23.1">qemu-sgabios-8-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1">qemu-testsuite-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-tools-2.6.2-23.1">qemu-tools-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.9.1-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1">qemu-vgabios-1.9.1-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.6.2-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:qemu-x86-2.6.2-23.1">qemu-x86-2.6.2-23.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.</Note>
    </Notes>
    <CVE>CVE-2016-7161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7161.html</URL>
        <Description>CVE-2016-7161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001151</URL>
        <Description>SUSE Bug 1001151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001152</URL>
        <Description>SUSE Bug 1001152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.</Note>
    </Notes>
    <CVE>CVE-2016-7170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7170.html</URL>
        <Description>CVE-2016-7170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998516</URL>
        <Description>SUSE Bug 998516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.</Note>
    </Notes>
    <CVE>CVE-2016-7422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7422.html</URL>
        <Description>CVE-2016-7422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000346</URL>
        <Description>SUSE Bug 1000346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.</Note>
    </Notes>
    <CVE>CVE-2016-7466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7466.html</URL>
        <Description>CVE-2016-7466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000345</URL>
        <Description>SUSE Bug 1000345</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7907.html</URL>
        <Description>CVE-2016-7907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002549</URL>
        <Description>SUSE Bug 1002549</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7908.html</URL>
        <Description>CVE-2016-7908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002550</URL>
        <Description>SUSE Bug 1002550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003030</URL>
        <Description>SUSE Bug 1003030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.</Note>
    </Notes>
    <CVE>CVE-2016-7909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7909.html</URL>
        <Description>CVE-2016-7909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002557</URL>
        <Description>SUSE Bug 1002557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003032</URL>
        <Description>SUSE Bug 1003032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.</Note>
    </Notes>
    <CVE>CVE-2016-7994</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7994.html</URL>
        <Description>CVE-2016-7994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003613</URL>
        <Description>SUSE Bug 1003613</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.</Note>
    </Notes>
    <CVE>CVE-2016-7995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7995.html</URL>
        <Description>CVE-2016-7995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003612</URL>
        <Description>SUSE Bug 1003612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003870</URL>
        <Description>SUSE Bug 1003870</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.</Note>
    </Notes>
    <CVE>CVE-2016-8576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8576.html</URL>
        <Description>CVE-2016-8576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003878</URL>
        <Description>SUSE Bug 1003878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004016</URL>
        <Description>SUSE Bug 1004016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.</Note>
    </Notes>
    <CVE>CVE-2016-8577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8577.html</URL>
        <Description>CVE-2016-8577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003893</URL>
        <Description>SUSE Bug 1003893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004021</URL>
        <Description>SUSE Bug 1004021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.</Note>
    </Notes>
    <CVE>CVE-2016-8578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8578.html</URL>
        <Description>CVE-2016-8578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003894</URL>
        <Description>SUSE Bug 1003894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004023</URL>
        <Description>SUSE Bug 1004023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.</Note>
    </Notes>
    <CVE>CVE-2016-8667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8667.html</URL>
        <Description>CVE-2016-8667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004702</URL>
        <Description>SUSE Bug 1004702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005004</URL>
        <Description>SUSE Bug 1005004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.</Note>
    </Notes>
    <CVE>CVE-2016-8668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8668.html</URL>
        <Description>CVE-2016-8668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004706</URL>
        <Description>SUSE Bug 1004706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.</Note>
    </Notes>
    <CVE>CVE-2016-8669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8669.html</URL>
        <Description>CVE-2016-8669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004707</URL>
        <Description>SUSE Bug 1004707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005005</URL>
        <Description>SUSE Bug 1005005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.</Note>
    </Notes>
    <CVE>CVE-2016-8909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8909.html</URL>
        <Description>CVE-2016-8909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006536</URL>
        <Description>SUSE Bug 1006536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007160</URL>
        <Description>SUSE Bug 1007160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.</Note>
    </Notes>
    <CVE>CVE-2016-8910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8910.html</URL>
        <Description>CVE-2016-8910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006538</URL>
        <Description>SUSE Bug 1006538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007157</URL>
        <Description>SUSE Bug 1007157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024178</URL>
        <Description>SUSE Bug 1024178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.</Note>
    </Notes>
    <CVE>CVE-2016-9101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9101.html</URL>
        <Description>CVE-2016-9101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007391</URL>
        <Description>SUSE Bug 1007391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013668</URL>
        <Description>SUSE Bug 1013668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024181</URL>
        <Description>SUSE Bug 1024181</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.</Note>
    </Notes>
    <CVE>CVE-2016-9104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9104.html</URL>
        <Description>CVE-2016-9104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007493</URL>
        <Description>SUSE Bug 1007493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014297</URL>
        <Description>SUSE Bug 1014297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034990</URL>
        <Description>SUSE Bug 1034990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.</Note>
    </Notes>
    <CVE>CVE-2016-9105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9105.html</URL>
        <Description>CVE-2016-9105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007494</URL>
        <Description>SUSE Bug 1007494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014279</URL>
        <Description>SUSE Bug 1014279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.</Note>
    </Notes>
    <CVE>CVE-2016-9106</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:qemu-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-arm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-curl-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-dmg-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-iscsi-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-rbd-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-block-ssh-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-extra-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-guest-agent-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ipxe-1.0.0-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-kvm-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-lang-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-linux-user-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-ppc-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-s390-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-seabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-sgabios-8-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-testsuite-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-tools-2.6.2-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-vgabios-1.9.1-23.1</ProductID>
        <ProductID>openSUSE Leap 42.2:qemu-x86-2.6.2-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9106.html</URL>
        <Description>CVE-2016-9106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007495</URL>
        <Description>SUSE Bug 1007495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014299</URL>
        <Description>SUSE Bug 1014299</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
