{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for xen","title":"Title of the patch"},{"category":"description","text":"\nThis update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)\n- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)\n- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)\n- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)\n- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)\n- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)\n- CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340).\n- CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a 'supposedly-ignored' operand size prefix (bsc#1012651).\n- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)\n- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)\n- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)\n- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298)\n\nThis non-security issue was fixed:\n\n- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd\n","title":"Description of the patch"},{"category":"details","text":"sleclo50sp3-xen-13030,sleman21-xen-13030,slemap21-xen-13030,sleposp3-xen-13030,slessp3-xen-13030","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0718-1.json"},{"category":"self","summary":"URL for SUSE-SU-2017:0718-1","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170718-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2017:0718-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html"},{"category":"self","summary":"SUSE Bug 1002496","url":"https://bugzilla.suse.com/1002496"},{"category":"self","summary":"SUSE Bug 1012651","url":"https://bugzilla.suse.com/1012651"},{"category":"self","summary":"SUSE Bug 1013657","url":"https://bugzilla.suse.com/1013657"},{"category":"self","summary":"SUSE Bug 1013668","url":"https://bugzilla.suse.com/1013668"},{"category":"self","summary":"SUSE Bug 1014298","url":"https://bugzilla.suse.com/1014298"},{"category":"self","summary":"SUSE Bug 1014507","url":"https://bugzilla.suse.com/1014507"},{"category":"self","summary":"SUSE Bug 1015169","url":"https://bugzilla.suse.com/1015169"},{"category":"self","summary":"SUSE Bug 1016340","url":"https://bugzilla.suse.com/1016340"},{"category":"self","summary":"SUSE Bug 1022871","url":"https://bugzilla.suse.com/1022871"},{"category":"self","summary":"SUSE Bug 1023004","url":"https://bugzilla.suse.com/1023004"},{"category":"self","summary":"SUSE Bug 1024183","url":"https://bugzilla.suse.com/1024183"},{"category":"self","summary":"SUSE Bug 1024834","url":"https://bugzilla.suse.com/1024834"},{"category":"self","summary":"SUSE Bug 907805","url":"https://bugzilla.suse.com/907805"},{"category":"self","summary":"SUSE CVE CVE-2014-8106 page","url":"https://www.suse.com/security/cve/CVE-2014-8106/"},{"category":"self","summary":"SUSE CVE CVE-2016-10013 page","url":"https://www.suse.com/security/cve/CVE-2016-10013/"},{"category":"self","summary":"SUSE CVE CVE-2016-10024 page","url":"https://www.suse.com/security/cve/CVE-2016-10024/"},{"category":"self","summary":"SUSE CVE CVE-2016-10155 page","url":"https://www.suse.com/security/cve/CVE-2016-10155/"},{"category":"self","summary":"SUSE CVE CVE-2016-9101 page","url":"https://www.suse.com/security/cve/CVE-2016-9101/"},{"category":"self","summary":"SUSE CVE CVE-2016-9776 page","url":"https://www.suse.com/security/cve/CVE-2016-9776/"},{"category":"self","summary":"SUSE CVE CVE-2016-9911 page","url":"https://www.suse.com/security/cve/CVE-2016-9911/"},{"category":"self","summary":"SUSE CVE CVE-2016-9921 page","url":"https://www.suse.com/security/cve/CVE-2016-9921/"},{"category":"self","summary":"SUSE CVE CVE-2016-9922 page","url":"https://www.suse.com/security/cve/CVE-2016-9922/"},{"category":"self","summary":"SUSE CVE CVE-2016-9932 page","url":"https://www.suse.com/security/cve/CVE-2016-9932/"},{"category":"self","summary":"SUSE CVE CVE-2017-2615 page","url":"https://www.suse.com/security/cve/CVE-2017-2615/"},{"category":"self","summary":"SUSE CVE CVE-2017-2620 page","url":"https://www.suse.com/security/cve/CVE-2017-2620/"}],"title":"Security update for xen","tracking":{"current_release_date":"2017-03-17T07:43:02Z","generator":{"date":"2017-03-17T07:43:02Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2017:0718-1","initial_release_date":"2017-03-17T07:43:02Z","revision_history":[{"date":"2017-03-17T07:43:02Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","product":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","product_id":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586"}},{"category":"product_version","name":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","product":{"name":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","product_id":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586"}},{"category":"product_version","name":"xen-libs-4.2.5_21-35.1.i586","product":{"name":"xen-libs-4.2.5_21-35.1.i586","product_id":"xen-libs-4.2.5_21-35.1.i586"}},{"category":"product_version","name":"xen-tools-domU-4.2.5_21-35.1.i586","product":{"name":"xen-tools-domU-4.2.5_21-35.1.i586","product_id":"xen-tools-domU-4.2.5_21-35.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"xen-4.2.5_21-35.1.x86_64","product":{"name":"xen-4.2.5_21-35.1.x86_64","product_id":"xen-4.2.5_21-35.1.x86_64"}},{"category":"product_version","name":"xen-doc-html-4.2.5_21-35.1.x86_64","product":{"name":"xen-doc-html-4.2.5_21-35.1.x86_64","product_id":"xen-doc-html-4.2.5_21-35.1.x86_64"}},{"category":"product_version","name":"xen-doc-pdf-4.2.5_21-35.1.x86_64","product":{"name":"xen-doc-pdf-4.2.5_21-35.1.x86_64","product_id":"xen-doc-pdf-4.2.5_21-35.1.x86_64"}},{"category":"product_version","name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","product":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","product_id":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"}},{"category":"product_version","name":"xen-libs-4.2.5_21-35.1.x86_64","product":{"name":"xen-libs-4.2.5_21-35.1.x86_64","product_id":"xen-libs-4.2.5_21-35.1.x86_64"}},{"category":"product_version","name":"xen-libs-32bit-4.2.5_21-35.1.x86_64","product":{"name":"xen-libs-32bit-4.2.5_21-35.1.x86_64","product_id":"xen-libs-32bit-4.2.5_21-35.1.x86_64"}},{"category":"product_version","name":"xen-tools-4.2.5_21-35.1.x86_64","product":{"name":"xen-tools-4.2.5_21-35.1.x86_64","product_id":"xen-tools-4.2.5_21-35.1.x86_64"}},{"category":"product_version","name":"xen-tools-domU-4.2.5_21-35.1.x86_64","product":{"name":"xen-tools-domU-4.2.5_21-35.1.x86_64","product_id":"xen-tools-domU-4.2.5_21-35.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE OpenStack Cloud 5","product":{"name":"SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5","product_identification_helper":{"cpe":"cpe:/o:suse:cloud:5"}}},{"category":"product_name","name":"SUSE Manager 2.1","product":{"name":"SUSE Manager 2.1","product_id":"SUSE Manager 2.1","product_identification_helper":{"cpe":"cpe:/o:suse:suse-manager-server:2.1"}}},{"category":"product_name","name":"SUSE Manager Proxy 2.1","product":{"name":"SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1","product_identification_helper":{"cpe":"cpe:/o:suse:suse-manager-proxy:2.1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Point of Sale 11 SP3","product":{"name":"SUSE Linux Enterprise Point of Sale 11 SP3","product_id":"SUSE Linux Enterprise Point of Sale 11 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-pos:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3-LTSS","product":{"name":"SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss:11:sp3"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"xen-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64"},"product_reference":"xen-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-html-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-pdf-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"},"product_reference":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-32bit-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-domU-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"xen-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64"},"product_reference":"xen-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-html-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-pdf-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"},"product_reference":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-32bit-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE Manager 2.1","product_id":"SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-domU-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64"},"product_reference":"xen-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-html-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-pdf-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"},"product_reference":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-32bit-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE Manager Proxy 2.1","product_id":"SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-domU-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Manager Proxy 2.1"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3","product_id":"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586"},"product_reference":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Point of Sale 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3","product_id":"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586"},"product_reference":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Point of Sale 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3","product_id":"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586"},"product_reference":"xen-libs-4.2.5_21-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Point of Sale 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-domU-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3","product_id":"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586"},"product_reference":"xen-tools-domU-4.2.5_21-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Point of Sale 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"xen-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64"},"product_reference":"xen-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-html-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-html-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-doc-pdf-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64"},"product_reference":"xen-doc-pdf-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586"},"product_reference":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64"},"product_reference":"xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586"},"product_reference":"xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586"},"product_reference":"xen-libs-4.2.5_21-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-libs-32bit-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64"},"product_reference":"xen-libs-32bit-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-domU-4.2.5_21-35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586"},"product_reference":"xen-tools-domU-4.2.5_21-35.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"},{"category":"default_component_of","full_product_name":{"name":"xen-tools-domU-4.2.5_21-35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64"},"product_reference":"xen-tools-domU-4.2.5_21-35.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-LTSS"}]},"vulnerabilities":[{"cve":"CVE-2014-8106","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-8106"}],"notes":[{"category":"general","text":"Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-8106","url":"https://www.suse.com/security/cve/CVE-2014-8106"},{"category":"external","summary":"SUSE Bug 1023004 for CVE-2014-8106","url":"https://bugzilla.suse.com/1023004"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2014-8106","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 907805 for CVE-2014-8106","url":"https://bugzilla.suse.com/907805"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2014-8106"},{"cve":"CVE-2016-10013","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-10013"}],"notes":[{"category":"general","text":"Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-10013","url":"https://www.suse.com/security/cve/CVE-2016-10013"},{"category":"external","summary":"SUSE Bug 1016340 for CVE-2016-10013","url":"https://bugzilla.suse.com/1016340"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2016-10013"},{"cve":"CVE-2016-10024","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-10024"}],"notes":[{"category":"general","text":"Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-10024","url":"https://www.suse.com/security/cve/CVE-2016-10024"},{"category":"external","summary":"SUSE Bug 1014298 for CVE-2016-10024","url":"https://bugzilla.suse.com/1014298"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2016-10024","url":"https://bugzilla.suse.com/1178658"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2016-10024"},{"cve":"CVE-2016-10155","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-10155"}],"notes":[{"category":"general","text":"Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-10155","url":"https://www.suse.com/security/cve/CVE-2016-10155"},{"category":"external","summary":"SUSE Bug 1021129 for CVE-2016-10155","url":"https://bugzilla.suse.com/1021129"},{"category":"external","summary":"SUSE Bug 1024183 for CVE-2016-10155","url":"https://bugzilla.suse.com/1024183"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2016-10155"},{"cve":"CVE-2016-9101","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-9101"}],"notes":[{"category":"general","text":"Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-9101","url":"https://www.suse.com/security/cve/CVE-2016-9101"},{"category":"external","summary":"SUSE Bug 1007391 for CVE-2016-9101","url":"https://bugzilla.suse.com/1007391"},{"category":"external","summary":"SUSE Bug 1013668 for CVE-2016-9101","url":"https://bugzilla.suse.com/1013668"},{"category":"external","summary":"SUSE Bug 1024181 for CVE-2016-9101","url":"https://bugzilla.suse.com/1024181"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"low"}],"title":"CVE-2016-9101"},{"cve":"CVE-2016-9776","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-9776"}],"notes":[{"category":"general","text":"QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-9776","url":"https://www.suse.com/security/cve/CVE-2016-9776"},{"category":"external","summary":"SUSE Bug 1013285 for CVE-2016-9776","url":"https://bugzilla.suse.com/1013285"},{"category":"external","summary":"SUSE Bug 1013657 for CVE-2016-9776","url":"https://bugzilla.suse.com/1013657"},{"category":"external","summary":"SUSE Bug 1024182 for CVE-2016-9776","url":"https://bugzilla.suse.com/1024182"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2016-9776","url":"https://bugzilla.suse.com/1178658"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"low"}],"title":"CVE-2016-9776"},{"cve":"CVE-2016-9911","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-9911"}],"notes":[{"category":"general","text":"Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-9911","url":"https://www.suse.com/security/cve/CVE-2016-9911"},{"category":"external","summary":"SUSE Bug 1014111 for CVE-2016-9911","url":"https://bugzilla.suse.com/1014111"},{"category":"external","summary":"SUSE Bug 1014507 for CVE-2016-9911","url":"https://bugzilla.suse.com/1014507"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"low"}],"title":"CVE-2016-9911"},{"cve":"CVE-2016-9921","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-9921"}],"notes":[{"category":"general","text":"Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-9921","url":"https://www.suse.com/security/cve/CVE-2016-9921"},{"category":"external","summary":"SUSE Bug 1014702 for CVE-2016-9921","url":"https://bugzilla.suse.com/1014702"},{"category":"external","summary":"SUSE Bug 1015169 for CVE-2016-9921","url":"https://bugzilla.suse.com/1015169"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2016-9921","url":"https://bugzilla.suse.com/1178658"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2016-9921"},{"cve":"CVE-2016-9922","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-9922"}],"notes":[{"category":"general","text":"The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-9922","url":"https://www.suse.com/security/cve/CVE-2016-9922"},{"category":"external","summary":"SUSE Bug 1014702 for CVE-2016-9922","url":"https://bugzilla.suse.com/1014702"},{"category":"external","summary":"SUSE Bug 1015169 for CVE-2016-9922","url":"https://bugzilla.suse.com/1015169"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2016-9922","url":"https://bugzilla.suse.com/1178658"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2016-9922"},{"cve":"CVE-2016-9932","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-9932"}],"notes":[{"category":"general","text":"CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a \"supposedly-ignored\" operand size prefix.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-9932","url":"https://www.suse.com/security/cve/CVE-2016-9932"},{"category":"external","summary":"SUSE Bug 1012651 for CVE-2016-9932","url":"https://bugzilla.suse.com/1012651"},{"category":"external","summary":"SUSE Bug 1016340 for CVE-2016-9932","url":"https://bugzilla.suse.com/1016340"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.0"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"low"}],"title":"CVE-2016-9932"},{"cve":"CVE-2017-2615","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-2615"}],"notes":[{"category":"general","text":"Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-2615","url":"https://www.suse.com/security/cve/CVE-2017-2615"},{"category":"external","summary":"SUSE Bug 1023004 for CVE-2017-2615","url":"https://bugzilla.suse.com/1023004"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2017-2615","url":"https://bugzilla.suse.com/1178658"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L","version":"3.0"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2017-2615"},{"cve":"CVE-2017-2620","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-2620"}],"notes":[{"category":"general","text":"Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-2620","url":"https://www.suse.com/security/cve/CVE-2017-2620"},{"category":"external","summary":"SUSE Bug 1024834 for CVE-2017-2620","url":"https://bugzilla.suse.com/1024834"},{"category":"external","summary":"SUSE Bug 1024972 for CVE-2017-2620","url":"https://bugzilla.suse.com/1024972"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2017-2620","url":"https://bugzilla.suse.com/1178658"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.9,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-35.1.x86_64","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.i586","SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-35.1.x86_64","SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-35.1.x86_64","SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-35.1.x86_64"]}],"threats":[{"category":"impact","date":"2017-03-17T07:43:02Z","details":"moderate"}],"title":"CVE-2017-2620"}]}