qemu was updated to fix 19 security issues.
These security issues were fixed :
CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012)
CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013)
CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018)
CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017)
CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019)
CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285)
CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222)
CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223)
CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982)
CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961)
CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959)
CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080)
CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466)
CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771)
CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774)
CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441)
CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760)
CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858)
CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859)
This non-security issue was fixed :
This update was imported from the SUSE:SLE-12-SP1:Update update project.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2016-1234.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(94309);
script_version("2.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2016-2391", "CVE-2016-2392", "CVE-2016-4453", "CVE-2016-4454", "CVE-2016-5105", "CVE-2016-5106", "CVE-2016-5107", "CVE-2016-5126", "CVE-2016-5238", "CVE-2016-5337", "CVE-2016-5338", "CVE-2016-5403", "CVE-2016-6490", "CVE-2016-6833", "CVE-2016-6836", "CVE-2016-6888", "CVE-2016-7116", "CVE-2016-7155", "CVE-2016-7156");
script_name(english:"openSUSE Security Update : qemu (openSUSE-2016-1234)");
script_summary(english:"Check for the openSUSE-2016-1234 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"qemu was updated to fix 19 security issues.
These security issues were fixed :
- CVE-2016-2392: The is_rndis function in the USB Net
device emulator (hw/usb/dev-network.c) in QEMU did not
properly validate USB configuration descriptor objects,
which allowed local guest OS administrators to cause a
denial of service (NULL pointer dereference and QEMU
process crash) via vectors involving a remote NDIS
control message packet (bsc#967012)
- CVE-2016-2391: The ohci_bus_start function in the USB
OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU
allowed local guest OS administrators to cause a denial
of service (NULL pointer dereference and QEMU process
crash) via vectors related to multiple eof_timers
(bsc#967013)
- CVE-2016-5106: The megasas_dcmd_set_properties function
in hw/scsi/megasas.c in QEMU, when built with MegaRAID
SAS 8708EM2 Host Bus Adapter emulation support, allowed
local guest administrators to cause a denial of service
(out-of-bounds write access) via vectors involving a
MegaRAID Firmware Interface (MFI) command (bsc#982018)
- CVE-2016-5105: The megasas_dcmd_cfg_read function in
hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS
8708EM2 Host Bus Adapter emulation support, used an
uninitialized variable, which allowed local guest
administrators to read host memory via vectors involving
a MegaRAID Firmware Interface (MFI) command (bsc#982017)
- CVE-2016-5107: The megasas_lookup_frame function in
QEMU, when built with MegaRAID SAS 8708EM2 Host Bus
Adapter emulation support, allowed local guest OS
administrators to cause a denial of service
(out-of-bounds read and crash) via unspecified vectors
(bsc#982019)
- CVE-2016-5126: Heap-based buffer overflow in the
iscsi_aio_ioctl function in block/iscsi.c in QEMU
allowed local guest OS users to cause a denial of
service (QEMU process crash) or possibly execute
arbitrary code via a crafted iSCSI asynchronous I/O
ioctl call (bsc#982285)
- CVE-2016-4454: The vmsvga_fifo_read_raw function in
hw/display/vmware_vga.c in QEMU allowed local guest OS
administrators to obtain sensitive host memory
information or cause a denial of service (QEMU process
crash) by changing FIFO registers and issuing a VGA
command, which triggers an out-of-bounds read
(bsc#982222)
- CVE-2016-4453: The vmsvga_fifo_run function in
hw/display/vmware_vga.c in QEMU allowed local guest OS
administrators to cause a denial of service (infinite
loop and QEMU process crash) via a VGA command
(bsc#982223)
- CVE-2016-5338: The (1) esp_reg_read and (2)
esp_reg_write functions in hw/scsi/esp.c in QEMU allowed
local guest OS administrators to cause a denial of
service (QEMU process crash) or execute arbitrary code
on the QEMU host via vectors related to the information
transfer buffer (bsc#983982)
- CVE-2016-5337: The megasas_ctrl_get_info function in
hw/scsi/megasas.c in QEMU allowed local guest OS
administrators to obtain sensitive host memory
information via vectors related to reading device
control information (bsc#983961)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in
QEMU allowed local guest OS administrators to cause a
denial of service (out-of-bounds write and QEMU process
crash) via vectors related to reading from the
information transfer buffer in non-DMA mode (bsc#982959)
- CVE-2016-5403: The virtqueue_pop function in
hw/virtio/virtio.c in QEMU allowed local guest OS
administrators to cause a denial of service (memory
consumption and QEMU process crash) by submitting
requests without waiting for completion (bsc#991080)
- CVE-2016-6490: Infinite loop in the virtio framework. A
privileged user inside the guest could have used this
flaw to crash the Qemu instance on the host resulting in
DoS (bsc#991466)
- CVE-2016-6888: Integer overflow in packet initialisation
in VMXNET3 device driver. A privileged user inside guest
could have used this flaw to crash the Qemu instance
resulting in DoS (bsc#994771)
- CVE-2016-6833: Use-after-free issue in the VMWARE
VMXNET3 NIC device support. A privileged user inside
guest could have used this issue to crash the Qemu
instance resulting in DoS (bsc#994774)
- CVE-2016-7116: Host directory sharing via Plan 9 File
System(9pfs) was vulnerable to a directory/path
traversal issue. A privileged user inside guest could
have used this flaw to access undue files on the host
(bsc#996441)
- CVE-2016-6836: VMWARE VMXNET3 NIC device support was
leaging information leakage. A privileged user inside
guest could have used this to leak host memory bytes to
a guest (bsc#994760)
- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus
a OOB access and/or infinite loop issue could have
allowed a privileged user inside guest to crash the Qemu
process resulting in DoS (bsc#997858)
- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus
a infinite loop issue could have allowed a privileged
user inside guest to crash the Qemu process resulting in
DoS (bsc#997859)
This non-security issue was fixed :
- bsc#1000048: Fix migration failure where target host is
a soon to be released SLES 12 SP2. Qemu's spice code
gets an assertion.
This update was imported from the SUSE:SLE-12-SP1:Update update
project."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1000048"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=967012"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=967013"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982017"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982018"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982019"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982222"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982223"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982285"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=982959"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=983961"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=983982"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=991080"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=991466"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=994760"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=994771"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=994774"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=996441"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=997858"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=997859"
);
script_set_attribute(attribute:"solution", value:"Update the affected qemu packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-arm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-arm-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-block-curl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-block-curl-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-block-rbd");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-block-rbd-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-extra-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-guest-agent");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-guest-agent-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-ipxe");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-kvm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-lang");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-linux-user");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-linux-user-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-linux-user-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-ppc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-ppc-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-s390");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-s390-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-seabios");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-sgabios");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-testsuite");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-vgabios");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-x86");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:qemu-x86-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.1");
script_set_attribute(attribute:"patch_publication_date", value:"2016/10/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/27");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE42\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-arm-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-arm-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-block-curl-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-block-curl-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-debugsource-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-extra-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-extra-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-guest-agent-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-guest-agent-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-ipxe-1.0.0-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-kvm-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-lang-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-linux-user-2.3.1-19.1") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-linux-user-debuginfo-2.3.1-19.1") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-linux-user-debugsource-2.3.1-19.1") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-ppc-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-ppc-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-s390-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-s390-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-seabios-1.8.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-sgabios-8-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-tools-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-tools-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-vgabios-1.8.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-x86-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", reference:"qemu-x86-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", cpu:"x86_64", reference:"qemu-block-rbd-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", cpu:"x86_64", reference:"qemu-block-rbd-debuginfo-2.3.1-19.3") ) flag++;
if ( rpm_check(release:"SUSE42.1", cpu:"x86_64", reference:"qemu-testsuite-2.3.1-19.6") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "qemu-linux-user / qemu-linux-user-debuginfo / etc");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | opensuse | qemu | p-cpe:/a:novell:opensuse:qemu |
novell | opensuse | qemu-arm | p-cpe:/a:novell:opensuse:qemu-arm |
novell | opensuse | qemu-arm-debuginfo | p-cpe:/a:novell:opensuse:qemu-arm-debuginfo |
novell | opensuse | qemu-block-curl | p-cpe:/a:novell:opensuse:qemu-block-curl |
novell | opensuse | qemu-block-curl-debuginfo | p-cpe:/a:novell:opensuse:qemu-block-curl-debuginfo |
novell | opensuse | qemu-block-rbd | p-cpe:/a:novell:opensuse:qemu-block-rbd |
novell | opensuse | qemu-block-rbd-debuginfo | p-cpe:/a:novell:opensuse:qemu-block-rbd-debuginfo |
novell | opensuse | qemu-debugsource | p-cpe:/a:novell:opensuse:qemu-debugsource |
novell | opensuse | qemu-extra | p-cpe:/a:novell:opensuse:qemu-extra |
novell | opensuse | qemu-extra-debuginfo | p-cpe:/a:novell:opensuse:qemu-extra-debuginfo |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156
bugzilla.opensuse.org/show_bug.cgi?id=1000048
bugzilla.opensuse.org/show_bug.cgi?id=967012
bugzilla.opensuse.org/show_bug.cgi?id=967013
bugzilla.opensuse.org/show_bug.cgi?id=982017
bugzilla.opensuse.org/show_bug.cgi?id=982018
bugzilla.opensuse.org/show_bug.cgi?id=982019
bugzilla.opensuse.org/show_bug.cgi?id=982222
bugzilla.opensuse.org/show_bug.cgi?id=982223
bugzilla.opensuse.org/show_bug.cgi?id=982285
bugzilla.opensuse.org/show_bug.cgi?id=982959
bugzilla.opensuse.org/show_bug.cgi?id=983961
bugzilla.opensuse.org/show_bug.cgi?id=983982
bugzilla.opensuse.org/show_bug.cgi?id=991080
bugzilla.opensuse.org/show_bug.cgi?id=991466
bugzilla.opensuse.org/show_bug.cgi?id=994760
bugzilla.opensuse.org/show_bug.cgi?id=994771
bugzilla.opensuse.org/show_bug.cgi?id=994774
bugzilla.opensuse.org/show_bug.cgi?id=996441
bugzilla.opensuse.org/show_bug.cgi?id=997858
bugzilla.opensuse.org/show_bug.cgi?id=997859