<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">glibc-2.24-2.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10154-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">glibc-2.24-2.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the glibc-2.24-2.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10154</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-5029/</URL>
      <Description>SUSE CVE CVE-2009-5029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3406/</URL>
      <Description>SUSE CVE CVE-2012-3406 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4412/</URL>
      <Description>SUSE CVE CVE-2012-4412 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0242/</URL>
      <Description>SUSE CVE CVE-2013-0242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1914/</URL>
      <Description>SUSE CVE CVE-2013-1914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2207/</URL>
      <Description>SUSE CVE CVE-2013-2207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4237/</URL>
      <Description>SUSE CVE CVE-2013-4237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4332/</URL>
      <Description>SUSE CVE CVE-2013-4332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4458/</URL>
      <Description>SUSE CVE CVE-2013-4458 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7423/</URL>
      <Description>SUSE CVE CVE-2013-7423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0475/</URL>
      <Description>SUSE CVE CVE-2014-0475 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4043/</URL>
      <Description>SUSE CVE CVE-2014-4043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5119/</URL>
      <Description>SUSE CVE CVE-2014-5119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6040/</URL>
      <Description>SUSE CVE CVE-2014-6040 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7817/</URL>
      <Description>SUSE CVE CVE-2014-7817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8121/</URL>
      <Description>SUSE CVE CVE-2014-8121 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9402/</URL>
      <Description>SUSE CVE CVE-2014-9402 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9761/</URL>
      <Description>SUSE CVE CVE-2014-9761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1472/</URL>
      <Description>SUSE CVE CVE-2015-1472 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1473/</URL>
      <Description>SUSE CVE CVE-2015-1473 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1781/</URL>
      <Description>SUSE CVE CVE-2015-1781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7547/</URL>
      <Description>SUSE CVE CVE-2015-7547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8776/</URL>
      <Description>SUSE CVE CVE-2015-8776 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8777/</URL>
      <Description>SUSE CVE CVE-2015-8777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8778/</URL>
      <Description>SUSE CVE CVE-2015-8778 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8779/</URL>
      <Description>SUSE CVE CVE-2015-8779 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1234/</URL>
      <Description>SUSE CVE CVE-2016-1234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3075/</URL>
      <Description>SUSE CVE CVE-2016-3075 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3706/</URL>
      <Description>SUSE CVE CVE-2016-3706 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4429/</URL>
      <Description>SUSE CVE CVE-2016-4429 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5417/</URL>
      <Description>SUSE CVE CVE-2016-5417 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="glibc-2.24-2.3">
      <FullProductName ProductID="glibc-2.24-2.3">glibc-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-32bit-2.24-2.3">
      <FullProductName ProductID="glibc-32bit-2.24-2.3">glibc-32bit-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-2.24-2.3">
      <FullProductName ProductID="glibc-devel-2.24-2.3">glibc-devel-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-32bit-2.24-2.3">
      <FullProductName ProductID="glibc-devel-32bit-2.24-2.3">glibc-devel-32bit-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-static-2.24-2.3">
      <FullProductName ProductID="glibc-devel-static-2.24-2.3">glibc-devel-static-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-static-32bit-2.24-2.3">
      <FullProductName ProductID="glibc-devel-static-32bit-2.24-2.3">glibc-devel-static-32bit-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-extra-2.24-2.3">
      <FullProductName ProductID="glibc-extra-2.24-2.3">glibc-extra-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-html-2.24-2.3">
      <FullProductName ProductID="glibc-html-2.24-2.3">glibc-html-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-i18ndata-2.24-2.3">
      <FullProductName ProductID="glibc-i18ndata-2.24-2.3">glibc-i18ndata-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-info-2.24-2.3">
      <FullProductName ProductID="glibc-info-2.24-2.3">glibc-info-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-2.24-2.3">
      <FullProductName ProductID="glibc-locale-2.24-2.3">glibc-locale-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-32bit-2.24-2.3">
      <FullProductName ProductID="glibc-locale-32bit-2.24-2.3">glibc-locale-32bit-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-obsolete-2.24-2.3">
      <FullProductName ProductID="glibc-obsolete-2.24-2.3">glibc-obsolete-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-2.24-2.3">
      <FullProductName ProductID="glibc-profile-2.24-2.3">glibc-profile-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-32bit-2.24-2.3">
      <FullProductName ProductID="glibc-profile-32bit-2.24-2.3">glibc-profile-32bit-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-utils-2.24-2.3">
      <FullProductName ProductID="glibc-utils-2.24-2.3">glibc-utils-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-utils-32bit-2.24-2.3">
      <FullProductName ProductID="glibc-utils-32bit-2.24-2.3">glibc-utils-32bit-2.24-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nscd-2.24-2.3">
      <FullProductName ProductID="nscd-2.24-2.3">nscd-2.24-2.3</FullProductName>
    </Branch>
    <Relationship ProductReference="glibc-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-2.24-2.3">glibc-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-32bit-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-32bit-2.24-2.3">glibc-32bit-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-devel-2.24-2.3">glibc-devel-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-32bit-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3">glibc-devel-32bit-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-static-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-devel-static-2.24-2.3">glibc-devel-static-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-static-32bit-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3">glibc-devel-static-32bit-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-extra-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-extra-2.24-2.3">glibc-extra-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-html-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-html-2.24-2.3">glibc-html-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-i18ndata-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3">glibc-i18ndata-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-info-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-info-2.24-2.3">glibc-info-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-locale-2.24-2.3">glibc-locale-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-32bit-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3">glibc-locale-32bit-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-obsolete-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-obsolete-2.24-2.3">glibc-obsolete-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-profile-2.24-2.3">glibc-profile-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-32bit-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3">glibc-profile-32bit-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-utils-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-utils-2.24-2.3">glibc-utils-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-utils-32bit-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3">glibc-utils-32bit-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nscd-2.24-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nscd-2.24-2.3">nscd-2.24-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.</Note>
    </Notes>
    <CVE>CVE-2009-5029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-5029.html</URL>
        <Description>CVE-2009-5029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/735850</URL>
        <Description>SUSE Bug 735850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/736174</URL>
        <Description>SUSE Bug 736174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/759836</URL>
        <Description>SUSE Bug 759836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/826666</URL>
        <Description>SUSE Bug 826666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.</Note>
    </Notes>
    <CVE>CVE-2012-3406</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3406.html</URL>
        <Description>CVE-2012-3406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770891</URL>
        <Description>SUSE Bug 770891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/826666</URL>
        <Description>SUSE Bug 826666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2012-4412</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4412.html</URL>
        <Description>CVE-2012-4412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/779320</URL>
        <Description>SUSE Bug 779320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848783</URL>
        <Description>SUSE Bug 848783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882910</URL>
        <Description>SUSE Bug 882910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920169</URL>
        <Description>SUSE Bug 920169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920338</URL>
        <Description>SUSE Bug 920338</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.</Note>
    </Notes>
    <CVE>CVE-2013-0242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0242.html</URL>
        <Description>CVE-2013-0242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801246</URL>
        <Description>SUSE Bug 801246</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848783</URL>
        <Description>SUSE Bug 848783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882910</URL>
        <Description>SUSE Bug 882910</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.</Note>
    </Notes>
    <CVE>CVE-2013-1914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1914.html</URL>
        <Description>CVE-2013-1914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813121</URL>
        <Description>SUSE Bug 813121</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/826666</URL>
        <Description>SUSE Bug 826666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882910</URL>
        <Description>SUSE Bug 882910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941444</URL>
        <Description>SUSE Bug 941444</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.</Note>
    </Notes>
    <CVE>CVE-2013-2207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2207.html</URL>
        <Description>CVE-2013-2207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/830257</URL>
        <Description>SUSE Bug 830257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979109</URL>
        <Description>SUSE Bug 979109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.</Note>
    </Notes>
    <CVE>CVE-2013-4237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4237.html</URL>
        <Description>CVE-2013-4237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834594</URL>
        <Description>SUSE Bug 834594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882910</URL>
        <Description>SUSE Bug 882910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883022</URL>
        <Description>SUSE Bug 883022</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.</Note>
    </Notes>
    <CVE>CVE-2013-4332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4332.html</URL>
        <Description>CVE-2013-4332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839870</URL>
        <Description>SUSE Bug 839870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882910</URL>
        <Description>SUSE Bug 882910</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.</Note>
    </Notes>
    <CVE>CVE-2013-4458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4458.html</URL>
        <Description>CVE-2013-4458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847227</URL>
        <Description>SUSE Bug 847227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883217</URL>
        <Description>SUSE Bug 883217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941444</URL>
        <Description>SUSE Bug 941444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955181</URL>
        <Description>SUSE Bug 955181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967023</URL>
        <Description>SUSE Bug 967023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980483</URL>
        <Description>SUSE Bug 980483</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.</Note>
    </Notes>
    <CVE>CVE-2013-7423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7423.html</URL>
        <Description>CVE-2013-7423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915526</URL>
        <Description>SUSE Bug 915526</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.</Note>
    </Notes>
    <CVE>CVE-2014-0475</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0475.html</URL>
        <Description>CVE-2014-0475</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887022</URL>
        <Description>SUSE Bug 887022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/896776</URL>
        <Description>SUSE Bug 896776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916222</URL>
        <Description>SUSE Bug 916222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.</Note>
    </Notes>
    <CVE>CVE-2014-4043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4043.html</URL>
        <Description>CVE-2014-4043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882600</URL>
        <Description>SUSE Bug 882600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939797</URL>
        <Description>SUSE Bug 939797</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.</Note>
    </Notes>
    <CVE>CVE-2014-5119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5119.html</URL>
        <Description>CVE-2014-5119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892073</URL>
        <Description>SUSE Bug 892073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903057</URL>
        <Description>SUSE Bug 903057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916222</URL>
        <Description>SUSE Bug 916222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.</Note>
    </Notes>
    <CVE>CVE-2014-6040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6040.html</URL>
        <Description>CVE-2014-6040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/894553</URL>
        <Description>SUSE Bug 894553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903057</URL>
        <Description>SUSE Bug 903057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916222</URL>
        <Description>SUSE Bug 916222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".</Note>
    </Notes>
    <CVE>CVE-2014-7817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7817.html</URL>
        <Description>CVE-2014-7817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/906371</URL>
        <Description>SUSE Bug 906371</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.</Note>
    </Notes>
    <CVE>CVE-2014-8121</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8121.html</URL>
        <Description>CVE-2014-8121</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918187</URL>
        <Description>SUSE Bug 918187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945779</URL>
        <Description>SUSE Bug 945779</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.</Note>
    </Notes>
    <CVE>CVE-2014-9402</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9402.html</URL>
        <Description>CVE-2014-9402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910599</URL>
        <Description>SUSE Bug 910599</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.</Note>
    </Notes>
    <CVE>CVE-2014-9761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9761.html</URL>
        <Description>CVE-2014-9761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962738</URL>
        <Description>SUSE Bug 962738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986086</URL>
        <Description>SUSE Bug 986086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.</Note>
    </Notes>
    <CVE>CVE-2015-1472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1472.html</URL>
        <Description>CVE-2015-1472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916222</URL>
        <Description>SUSE Bug 916222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920341</URL>
        <Description>SUSE Bug 920341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922243</URL>
        <Description>SUSE Bug 922243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.</Note>
    </Notes>
    <CVE>CVE-2015-1473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1473.html</URL>
        <Description>CVE-2015-1473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916222</URL>
        <Description>SUSE Bug 916222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920341</URL>
        <Description>SUSE Bug 920341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922243</URL>
        <Description>SUSE Bug 922243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.</Note>
    </Notes>
    <CVE>CVE-2015-1781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1781.html</URL>
        <Description>CVE-2015-1781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927080</URL>
        <Description>SUSE Bug 927080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979109</URL>
        <Description>SUSE Bug 979109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.</Note>
    </Notes>
    <CVE>CVE-2015-7547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7547.html</URL>
        <Description>CVE-2015-7547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077097</URL>
        <Description>SUSE Bug 1077097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847227</URL>
        <Description>SUSE Bug 847227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961721</URL>
        <Description>SUSE Bug 961721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967023</URL>
        <Description>SUSE Bug 967023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967061</URL>
        <Description>SUSE Bug 967061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967072</URL>
        <Description>SUSE Bug 967072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967496</URL>
        <Description>SUSE Bug 967496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969216</URL>
        <Description>SUSE Bug 969216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969241</URL>
        <Description>SUSE Bug 969241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969591</URL>
        <Description>SUSE Bug 969591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986086</URL>
        <Description>SUSE Bug 986086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.</Note>
    </Notes>
    <CVE>CVE-2015-8776</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8776.html</URL>
        <Description>CVE-2015-8776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962736</URL>
        <Description>SUSE Bug 962736</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986086</URL>
        <Description>SUSE Bug 986086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.</Note>
    </Notes>
    <CVE>CVE-2015-8777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8777.html</URL>
        <Description>CVE-2015-8777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950944</URL>
        <Description>SUSE Bug 950944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962735</URL>
        <Description>SUSE Bug 962735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.</Note>
    </Notes>
    <CVE>CVE-2015-8778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8778.html</URL>
        <Description>CVE-2015-8778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962737</URL>
        <Description>SUSE Bug 962737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986086</URL>
        <Description>SUSE Bug 986086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.</Note>
    </Notes>
    <CVE>CVE-2015-8779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8779.html</URL>
        <Description>CVE-2015-8779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962739</URL>
        <Description>SUSE Bug 962739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965453</URL>
        <Description>SUSE Bug 965453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986086</URL>
        <Description>SUSE Bug 986086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.</Note>
    </Notes>
    <CVE>CVE-2016-1234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1234.html</URL>
        <Description>CVE-2016-1234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969727</URL>
        <Description>SUSE Bug 969727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988770</URL>
        <Description>SUSE Bug 988770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988782</URL>
        <Description>SUSE Bug 988782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989127</URL>
        <Description>SUSE Bug 989127</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.</Note>
    </Notes>
    <CVE>CVE-2016-3075</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3075.html</URL>
        <Description>CVE-2016-3075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/973164</URL>
        <Description>SUSE Bug 973164</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.</Note>
    </Notes>
    <CVE>CVE-2016-3706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3706.html</URL>
        <Description>CVE-2016-3706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980483</URL>
        <Description>SUSE Bug 980483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997423</URL>
        <Description>SUSE Bug 997423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.</Note>
    </Notes>
    <CVE>CVE-2016-4429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4429.html</URL>
        <Description>CVE-2016-4429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1081556</URL>
        <Description>SUSE Bug 1081556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980854</URL>
        <Description>SUSE Bug 980854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initialization of internal resolver data structures.</Note>
    </Notes>
    <CVE>CVE-2016-5417</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-obsolete-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-utils-32bit-2.24-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.24-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5417.html</URL>
        <Description>CVE-2016-5417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991670</URL>
        <Description>SUSE Bug 991670</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
