<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0008-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-01-02T08:13:41Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-01-02T08:13:41Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-01-02T08:13:41Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This updates xen to version 4.4.4_06 to fix the following issues:

- An unprivileged user in a guest could gain guest could escalate privilege to
  that of the guest kernel, if it had could invoke the instruction emulator.
  Only 64-bit x86 HVM guest were affected. Linux guest have not been
  vulnerable. (boo#1016340, CVE-2016-10013)
- An unprivileged user in a 64 bit x86 guest could gain information from the
  host, crash the host or gain privilege of the host
  (boo#1009107, CVE-2016-9383)
- An unprivileged guest process could (unintentionally or maliciously) obtain
  or ocorrupt sensitive information of other programs in the same guest. Only
  x86 HVM guests have been affected. The attacker needs to be able to trigger
  the Xen instruction emulator.
  (boo#1000106, CVE-2016-7777)
- A guest on x86 systems could read small parts of hypervisor stack data
  (boo#1012651, CVE-2016-9932)
- A malicious guest kernel could hang or crash the host system (boo#1014298,
  CVE-2016-10024)
- A malicious guest administrator could escalate their privilege to that of
  the host. Only affects x86 HVM guests using qemu older version 1.6.0 or
  using the qemu-xen-traditional.
  (boo#1011652, CVE-2016-9637)
- An unprivileged guest user could escalate privilege to that of the guest
  administrator on x86 HVM guests, especially on Intel CPUs
  (boo#1009100, CVE-2016-9386)
- An unprivileged guest user could escalate privilege to that of the guest
  administrator (on AMD CPUs) or crash the system (on Intel CPUs) on 32-bit
  x86 HVM guests. Only guest operating systems that allowed a new task to
  start in VM86 mode were affected.
  (boo#1009103, CVE-2016-9382)
- A malicious guest administrator could crash the host on x86 PV guests only
  (boo#1009104, CVE-2016-9385)
- A malicious guest administrator could get privilege of the host emulator
  process on x86 HVM guests.
  (boo#1009109, CVE-2016-9381)
- A vulnerability in pygrub allowed a malicious guest administrator to obtain
  the contents of sensitive host files, or even delete those files
  (boo#1009111, CVE-2016-9379, CVE-2016-9380)
- A privileged guest user could cause an infinite loop in the RTL8139 ethernet
  emulation to consume CPU cycles on the host, causing a DoS situation
  (boo#1007157, CVE-2016-8910)
- A privileged guest user could cause an infinite loop in the intel-hda sound
  emulation to consume CPU cycles on the host, causing a DoS situation
  (boo#1007160, CVE-2016-8909)
- A privileged guest user could cause a crash of the emulator process on the
  host by exploiting a divide by zero vulnerability of the JAZZ RC4030 chipset
  emulation
  (boo#1005004 CVE-2016-8667)
- A privileged guest user could cause a crash of the emulator process on the
  host by exploiting a divide by zero issue of the 16550A UART emulation
  (boo#1005005, CVE-2016-8669)
- A privileged guest user could cause an infinite loop in the USB xHCI
  emulation, causing a DoS situation on the host
  (boo#1004016, CVE-2016-8576)
- A privileged guest user could cause an infinite loop in the ColdFire Fash
  Ethernet Controller emulation, causing a DoS situation on the host
  (boo#1003030, CVE-2016-7908)
- A privileged guest user could cause an infinite loop in the AMD PC-Net II
  emulation, causing a DoS situation on the host
  (boo#1003032, CVE-2016-7909)
- Cause a reload of clvm in the block-dmmd script to avoid a blocking lvchange
  call (boo#1002496)
- Also unplug SCSI disks in qemu-xen-traditional for upstream unplug protocol.
  Before a single SCSI storage devices added to HVM guests could appear
  multiple times in the guest.
  (boo#953518)
- Fix a kernel panic / black screen when trying to boot a XEN kernel on some
  UEFI firmwares
  (boo#1000195)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:0008-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.4.4_06-58.1">
      <FullProductName ProductID="xen-4.4.4_06-58.1">xen-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-debugsource-4.4.4_06-58.1">
      <FullProductName ProductID="xen-debugsource-4.4.4_06-58.1">xen-debugsource-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.4.4_06-58.1">
      <FullProductName ProductID="xen-devel-4.4.4_06-58.1">xen-devel-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.4.4_06-58.1">
      <FullProductName ProductID="xen-doc-html-4.4.4_06-58.1">xen-doc-html-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1">
      <FullProductName ProductID="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1">xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1">
      <FullProductName ProductID="xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1">xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1">
      <FullProductName ProductID="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1">xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1">
      <FullProductName ProductID="xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1">xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.4.4_06-58.1">
      <FullProductName ProductID="xen-libs-4.4.4_06-58.1">xen-libs-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.4.4_06-58.1">
      <FullProductName ProductID="xen-libs-32bit-4.4.4_06-58.1">xen-libs-32bit-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-debuginfo-4.4.4_06-58.1">
      <FullProductName ProductID="xen-libs-debuginfo-4.4.4_06-58.1">xen-libs-debuginfo-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-debuginfo-32bit-4.4.4_06-58.1">
      <FullProductName ProductID="xen-libs-debuginfo-32bit-4.4.4_06-58.1">xen-libs-debuginfo-32bit-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.4.4_06-58.1">
      <FullProductName ProductID="xen-tools-4.4.4_06-58.1">xen-tools-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-debuginfo-4.4.4_06-58.1">
      <FullProductName ProductID="xen-tools-debuginfo-4.4.4_06-58.1">xen-tools-debuginfo-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.4.4_06-58.1">
      <FullProductName ProductID="xen-tools-domU-4.4.4_06-58.1">xen-tools-domU-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-debuginfo-4.4.4_06-58.1">
      <FullProductName ProductID="xen-tools-domU-debuginfo-4.4.4_06-58.1">xen-tools-domU-debuginfo-4.4.4_06-58.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-4.4.4_06-58.1">xen-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-debugsource-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-debugsource-4.4.4_06-58.1">xen-debugsource-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-devel-4.4.4_06-58.1">xen-devel-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-doc-html-4.4.4_06-58.1">xen-doc-html-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1">xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1">xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1">xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1">xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-4.4.4_06-58.1">xen-libs-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1">xen-libs-32bit-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-debuginfo-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1">xen-libs-debuginfo-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-debuginfo-32bit-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1">xen-libs-debuginfo-32bit-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-4.4.4_06-58.1">xen-tools-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-debuginfo-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1">xen-tools-debuginfo-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1">xen-tools-domU-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-debuginfo-4.4.4_06-58.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1">xen-tools-domU-debuginfo-4.4.4_06-58.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.</Note>
    </Notes>
    <CVE>CVE-2016-10013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10013.html</URL>
        <Description>CVE-2016-10013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1016340</URL>
        <Description>SUSE Bug 1016340</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.</Note>
    </Notes>
    <CVE>CVE-2016-10024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10024.html</URL>
        <Description>CVE-2016-10024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014298</URL>
        <Description>SUSE Bug 1014298</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.</Note>
    </Notes>
    <CVE>CVE-2016-7777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7777.html</URL>
        <Description>CVE-2016-7777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000106</URL>
        <Description>SUSE Bug 1000106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7908.html</URL>
        <Description>CVE-2016-7908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002550</URL>
        <Description>SUSE Bug 1002550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003030</URL>
        <Description>SUSE Bug 1003030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.</Note>
    </Notes>
    <CVE>CVE-2016-7909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7909.html</URL>
        <Description>CVE-2016-7909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002557</URL>
        <Description>SUSE Bug 1002557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003032</URL>
        <Description>SUSE Bug 1003032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.</Note>
    </Notes>
    <CVE>CVE-2016-8576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8576.html</URL>
        <Description>CVE-2016-8576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003878</URL>
        <Description>SUSE Bug 1003878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004016</URL>
        <Description>SUSE Bug 1004016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.</Note>
    </Notes>
    <CVE>CVE-2016-8667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8667.html</URL>
        <Description>CVE-2016-8667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004702</URL>
        <Description>SUSE Bug 1004702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005004</URL>
        <Description>SUSE Bug 1005004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.</Note>
    </Notes>
    <CVE>CVE-2016-8669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8669.html</URL>
        <Description>CVE-2016-8669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004707</URL>
        <Description>SUSE Bug 1004707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005005</URL>
        <Description>SUSE Bug 1005005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.</Note>
    </Notes>
    <CVE>CVE-2016-8909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8909.html</URL>
        <Description>CVE-2016-8909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006536</URL>
        <Description>SUSE Bug 1006536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007160</URL>
        <Description>SUSE Bug 1007160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.</Note>
    </Notes>
    <CVE>CVE-2016-8910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.4</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8910.html</URL>
        <Description>CVE-2016-8910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006538</URL>
        <Description>SUSE Bug 1006538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007157</URL>
        <Description>SUSE Bug 1007157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024178</URL>
        <Description>SUSE Bug 1024178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.</Note>
    </Notes>
    <CVE>CVE-2016-9379</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9379.html</URL>
        <Description>CVE-2016-9379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009111</URL>
        <Description>SUSE Bug 1009111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.</Note>
    </Notes>
    <CVE>CVE-2016-9380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9380.html</URL>
        <Description>CVE-2016-9380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009111</URL>
        <Description>SUSE Bug 1009111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-9381</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.0</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9381.html</URL>
        <Description>CVE-2016-9381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009109</URL>
        <Description>SUSE Bug 1009109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.</Note>
    </Notes>
    <CVE>CVE-2016-9382</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9382.html</URL>
        <Description>CVE-2016-9382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009103</URL>
        <Description>SUSE Bug 1009103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.</Note>
    </Notes>
    <CVE>CVE-2016-9383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9383.html</URL>
        <Description>CVE-2016-9383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009107</URL>
        <Description>SUSE Bug 1009107</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.</Note>
    </Notes>
    <CVE>CVE-2016-9385</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9385.html</URL>
        <Description>CVE-2016-9385</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009104</URL>
        <Description>SUSE Bug 1009104</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.</Note>
    </Notes>
    <CVE>CVE-2016-9386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9386.html</URL>
        <Description>CVE-2016-9386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009100</URL>
        <Description>SUSE Bug 1009100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.</Note>
    </Notes>
    <CVE>CVE-2016-9637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9637.html</URL>
        <Description>CVE-2016-9637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011652</URL>
        <Description>SUSE Bug 1011652</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.</Note>
    </Notes>
    <CVE>CVE-2016-9932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.4_06_k3.16.7_53-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.4_06-58.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.4_06-58.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>0.9</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9932.html</URL>
        <Description>CVE-2016-9932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012651</URL>
        <Description>SUSE Bug 1012651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1016340</URL>
        <Description>SUSE Bug 1016340</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
