<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for kvm</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1152-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2014-09-19T14:41:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2014-09-19T14:41:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2014-09-19T14:41:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for kvm</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
kvm has been updated to fix issues in the embedded qemu:

    * 

      CVE-2014-0223: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could potentially have
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

    * 

      CVE-2014-3461: A user able to alter the savevm data (either on the
      disk or over the wire during migration) could have used this flaw to
      to corrupt QEMU process memory on the (destination) host, which could
      have potentially resulted in arbitrary code execution on the host
      with the privileges of the QEMU process.

    * 

      CVE-2014-0222: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could have potentially
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

Non-security bugs fixed:

    * Fix exceeding IRQ routes that could have caused freezes of guests.
      (bnc#876842)
    * Fix CPUID emulation bugs that may have broken Windows guests with
      newer -cpu types (bnc#886535)

Security Issues:

    * CVE-2014-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222&gt;
    * CVE-2014-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223&gt;
    * CVE-2014-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461&gt;

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sledsp3-kvm,slessp3-kvm</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      <Description>Link for SUSE-SU-2015:1152-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-June/001465.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1152-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/812836</URL>
      <Description>SUSE Bug 812836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/812983</URL>
      <Description>SUSE Bug 812983</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/817593</URL>
      <Description>SUSE Bug 817593</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/821819</URL>
      <Description>SUSE Bug 821819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/824340</URL>
      <Description>SUSE Bug 824340</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/829800</URL>
      <Description>SUSE Bug 829800</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/841080</URL>
      <Description>SUSE Bug 841080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/842006</URL>
      <Description>SUSE Bug 842006</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/842088</URL>
      <Description>SUSE Bug 842088</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/858858</URL>
      <Description>SUSE Bug 858858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864391</URL>
      <Description>SUSE Bug 864391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864649</URL>
      <Description>SUSE Bug 864649</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864650</URL>
      <Description>SUSE Bug 864650</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864653</URL>
      <Description>SUSE Bug 864653</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864655</URL>
      <Description>SUSE Bug 864655</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864665</URL>
      <Description>SUSE Bug 864665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864671</URL>
      <Description>SUSE Bug 864671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864673</URL>
      <Description>SUSE Bug 864673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864678</URL>
      <Description>SUSE Bug 864678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864682</URL>
      <Description>SUSE Bug 864682</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864769</URL>
      <Description>SUSE Bug 864769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864796</URL>
      <Description>SUSE Bug 864796</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864801</URL>
      <Description>SUSE Bug 864801</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864802</URL>
      <Description>SUSE Bug 864802</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864804</URL>
      <Description>SUSE Bug 864804</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864805</URL>
      <Description>SUSE Bug 864805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864811</URL>
      <Description>SUSE Bug 864811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864812</URL>
      <Description>SUSE Bug 864812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/864814</URL>
      <Description>SUSE Bug 864814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/870439</URL>
      <Description>SUSE Bug 870439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/873235</URL>
      <Description>SUSE Bug 873235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/874749</URL>
      <Description>SUSE Bug 874749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/874788</URL>
      <Description>SUSE Bug 874788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/876842</URL>
      <Description>SUSE Bug 876842</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/877642</URL>
      <Description>SUSE Bug 877642</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/877645</URL>
      <Description>SUSE Bug 877645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/878541</URL>
      <Description>SUSE Bug 878541</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/886535</URL>
      <Description>SUSE Bug 886535</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/920571</URL>
      <Description>SUSE Bug 920571</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/924018</URL>
      <Description>SUSE Bug 924018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/929339</URL>
      <Description>SUSE Bug 929339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/932267</URL>
      <Description>SUSE Bug 932267</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/932770</URL>
      <Description>SUSE Bug 932770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2016/</URL>
      <Description>SUSE CVE CVE-2013-2016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4344/</URL>
      <Description>SUSE CVE CVE-2013-4344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4541/</URL>
      <Description>SUSE CVE CVE-2013-4541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0142/</URL>
      <Description>SUSE CVE CVE-2014-0142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0143/</URL>
      <Description>SUSE CVE CVE-2014-0143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0144/</URL>
      <Description>SUSE CVE CVE-2014-0144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0145/</URL>
      <Description>SUSE CVE CVE-2014-0145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0146/</URL>
      <Description>SUSE CVE CVE-2014-0146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0147/</URL>
      <Description>SUSE CVE CVE-2014-0147 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0150/</URL>
      <Description>SUSE CVE CVE-2014-0150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0222/</URL>
      <Description>SUSE CVE CVE-2014-0222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0223/</URL>
      <Description>SUSE CVE CVE-2014-0223 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2894/</URL>
      <Description>SUSE CVE CVE-2014-2894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3461/</URL>
      <Description>SUSE CVE CVE-2014-3461 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1779/</URL>
      <Description>SUSE CVE CVE-2015-1779 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3209/</URL>
      <Description>SUSE CVE CVE-2015-3209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3456/</URL>
      <Description>SUSE CVE CVE-2015-3456 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3" CPE="cpe:/o:suse:suse_sled:11:sp3">SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3">SUSE Linux Enterprise Server 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3" CPE="cpe:/o:suse:sles_sap:11:sp3">SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kvm-1.4.2-0.17.1">
      <FullProductName ProductID="kvm-1.4.2-0.17.1">kvm-1.4.2-0.17.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kvm-1.4.2-0.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1">kvm-1.4.2-0.17.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kvm-1.4.2-0.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1">kvm-1.4.2-0.17.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kvm-1.4.2-0.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1">kvm-1.4.2-0.17.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="kvm-1.4.2-0.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1">kvm-1.4.2-0.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.</Note>
    </Notes>
    <CVE>CVE-2013-2016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2016.html</URL>
        <Description>CVE-2013-2016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/817593</URL>
        <Description>SUSE Bug 817593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.</Note>
    </Notes>
    <CVE>CVE-2013-4344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4344.html</URL>
        <Description>CVE-2013-4344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/842006</URL>
        <Description>SUSE Bug 842006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880751</URL>
        <Description>SUSE Bug 880751</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.</Note>
    </Notes>
    <CVE>CVE-2013-4541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4541.html</URL>
        <Description>CVE-2013-4541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864802</URL>
        <Description>SUSE Bug 864802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.</Note>
    </Notes>
    <CVE>CVE-2014-0142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0142.html</URL>
        <Description>CVE-2014-0142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.</Note>
    </Notes>
    <CVE>CVE-2014-0143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0143.html</URL>
        <Description>CVE-2014-0143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2014-0144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0144.html</URL>
        <Description>CVE-2014-0144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).</Note>
    </Notes>
    <CVE>CVE-2014-0145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0145.html</URL>
        <Description>CVE-2014-0145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.</Note>
    </Notes>
    <CVE>CVE-2014-0146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0146.html</URL>
        <Description>CVE-2014-0146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.</Note>
    </Notes>
    <CVE>CVE-2014-0147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0147.html</URL>
        <Description>CVE-2014-0147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2014-0150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0150.html</URL>
        <Description>CVE-2014-0150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873235</URL>
        <Description>SUSE Bug 873235</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.</Note>
    </Notes>
    <CVE>CVE-2014-0222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0222.html</URL>
        <Description>CVE-2014-0222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072223</URL>
        <Description>SUSE Bug 1072223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877642</URL>
        <Description>SUSE Bug 877642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964925</URL>
        <Description>SUSE Bug 964925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2014-0223</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0223.html</URL>
        <Description>CVE-2014-0223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877645</URL>
        <Description>SUSE Bug 877645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.</Note>
    </Notes>
    <CVE>CVE-2014-2894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2894.html</URL>
        <Description>CVE-2014-2894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/874749</URL>
        <Description>SUSE Bug 874749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."</Note>
    </Notes>
    <CVE>CVE-2014-3461</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3461.html</URL>
        <Description>CVE-2014-3461</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/878541</URL>
        <Description>SUSE Bug 878541</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.</Note>
    </Notes>
    <CVE>CVE-2015-1779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1779.html</URL>
        <Description>CVE-2015-1779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924018</URL>
        <Description>SUSE Bug 924018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962632</URL>
        <Description>SUSE Bug 962632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.</Note>
    </Notes>
    <CVE>CVE-2015-3209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3209.html</URL>
        <Description>CVE-2015-3209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932267</URL>
        <Description>SUSE Bug 932267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932770</URL>
        <Description>SUSE Bug 932770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932823</URL>
        <Description>SUSE Bug 932823</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.</Note>
    </Notes>
    <CVE>CVE-2015-3456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3456.html</URL>
        <Description>CVE-2015-3456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929339</URL>
        <Description>SUSE Bug 929339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932770</URL>
        <Description>SUSE Bug 932770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935900</URL>
        <Description>SUSE Bug 935900</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
