<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libxml2-2-2.9.4-1.22 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10192</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libxml2-2-2.9.4-1.22 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libxml2-2-2.9.4-1.22 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10192</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4225/</URL>
      <Description>SUSE CVE CVE-2008-4225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4226/</URL>
      <Description>SUSE CVE CVE-2008-4226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4409/</URL>
      <Description>SUSE CVE CVE-2008-4409 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4494/</URL>
      <Description>SUSE CVE CVE-2010-4494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1944/</URL>
      <Description>SUSE CVE CVE-2011-1944 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5134/</URL>
      <Description>SUSE CVE CVE-2012-5134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0338/</URL>
      <Description>SUSE CVE CVE-2013-0338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1969/</URL>
      <Description>SUSE CVE CVE-2013-1969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0191/</URL>
      <Description>SUSE CVE CVE-2014-0191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3660/</URL>
      <Description>SUSE CVE CVE-2014-3660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1819/</URL>
      <Description>SUSE CVE CVE-2015-1819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5312/</URL>
      <Description>SUSE CVE CVE-2015-5312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7497/</URL>
      <Description>SUSE CVE CVE-2015-7497 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7498/</URL>
      <Description>SUSE CVE CVE-2015-7498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7499/</URL>
      <Description>SUSE CVE CVE-2015-7499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7500/</URL>
      <Description>SUSE CVE CVE-2015-7500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7941/</URL>
      <Description>SUSE CVE CVE-2015-7941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7942/</URL>
      <Description>SUSE CVE CVE-2015-7942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8035/</URL>
      <Description>SUSE CVE CVE-2015-8035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8242/</URL>
      <Description>SUSE CVE CVE-2015-8242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1762/</URL>
      <Description>SUSE CVE CVE-2016-1762 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1833/</URL>
      <Description>SUSE CVE CVE-2016-1833 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1834/</URL>
      <Description>SUSE CVE CVE-2016-1834 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1835/</URL>
      <Description>SUSE CVE CVE-2016-1835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1836/</URL>
      <Description>SUSE CVE CVE-2016-1836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1837/</URL>
      <Description>SUSE CVE CVE-2016-1837 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1838/</URL>
      <Description>SUSE CVE CVE-2016-1838 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1839/</URL>
      <Description>SUSE CVE CVE-2016-1839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1840/</URL>
      <Description>SUSE CVE CVE-2016-1840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3627/</URL>
      <Description>SUSE CVE CVE-2016-3627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3705/</URL>
      <Description>SUSE CVE CVE-2016-3705 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4483/</URL>
      <Description>SUSE CVE CVE-2016-4483 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-2.9.4-1.22">
      <FullProductName ProductID="libxml2-2-2.9.4-1.22">libxml2-2-2.9.4-1.22</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-32bit-2.9.4-1.22">
      <FullProductName ProductID="libxml2-2-32bit-2.9.4-1.22">libxml2-2-32bit-2.9.4-1.22</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-2.9.4-1.22">
      <FullProductName ProductID="libxml2-devel-2.9.4-1.22">libxml2-devel-2.9.4-1.22</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-32bit-2.9.4-1.22">
      <FullProductName ProductID="libxml2-devel-32bit-2.9.4-1.22">libxml2-devel-32bit-2.9.4-1.22</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-doc-2.9.4-1.22">
      <FullProductName ProductID="libxml2-doc-2.9.4-1.22">libxml2-doc-2.9.4-1.22</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-tools-2.9.4-1.22">
      <FullProductName ProductID="libxml2-tools-2.9.4-1.22">libxml2-tools-2.9.4-1.22</FullProductName>
    </Branch>
    <Relationship ProductReference="libxml2-2-2.9.4-1.22" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxml2-2-2.9.4-1.22">libxml2-2-2.9.4-1.22 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-32bit-2.9.4-1.22" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22">libxml2-2-32bit-2.9.4-1.22 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-devel-2.9.4-1.22" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22">libxml2-devel-2.9.4-1.22 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-devel-32bit-2.9.4-1.22" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22">libxml2-devel-32bit-2.9.4-1.22 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-doc-2.9.4-1.22" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22">libxml2-doc-2.9.4-1.22 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-tools-2.9.4-1.22" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22">libxml2-tools-2.9.4-1.22 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.</Note>
    </Notes>
    <CVE>CVE-2008-4225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4225.html</URL>
        <Description>CVE-2008-4225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/445677</URL>
        <Description>SUSE Bug 445677</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.</Note>
    </Notes>
    <CVE>CVE-2008-4226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4226.html</URL>
        <Description>CVE-2008-4226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/441368</URL>
        <Description>SUSE Bug 441368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.</Note>
    </Notes>
    <CVE>CVE-2008-4409</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4409.html</URL>
        <Description>CVE-2008-4409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/432486</URL>
        <Description>SUSE Bug 432486</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.</Note>
    </Notes>
    <CVE>CVE-2010-4494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4494.html</URL>
        <Description>CVE-2010-4494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/661471</URL>
        <Description>SUSE Bug 661471</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.</Note>
    </Notes>
    <CVE>CVE-2011-1944</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1944.html</URL>
        <Description>CVE-2011-1944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697372</URL>
        <Description>SUSE Bug 697372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.</Note>
    </Notes>
    <CVE>CVE-2012-5134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5134.html</URL>
        <Description>CVE-2012-5134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/791234</URL>
        <Description>SUSE Bug 791234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/793334</URL>
        <Description>SUSE Bug 793334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/795039</URL>
        <Description>SUSE Bug 795039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/804033</URL>
        <Description>SUSE Bug 804033</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.</Note>
    </Notes>
    <CVE>CVE-2013-0338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0338.html</URL>
        <Description>CVE-2013-0338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/805233</URL>
        <Description>SUSE Bug 805233</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.</Note>
    </Notes>
    <CVE>CVE-2013-1969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1969.html</URL>
        <Description>CVE-2013-1969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/815665</URL>
        <Description>SUSE Bug 815665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2014-0191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0191.html</URL>
        <Description>CVE-2014-0191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/876652</URL>
        <Description>SUSE Bug 876652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877506</URL>
        <Description>SUSE Bug 877506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996079</URL>
        <Description>SUSE Bug 996079</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.</Note>
    </Notes>
    <CVE>CVE-2014-3660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3660.html</URL>
        <Description>CVE-2014-3660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901546</URL>
        <Description>SUSE Bug 901546</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.</Note>
    </Notes>
    <CVE>CVE-2015-1819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1819.html</URL>
        <Description>CVE-2015-1819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928193</URL>
        <Description>SUSE Bug 928193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.</Note>
    </Notes>
    <CVE>CVE-2015-5312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5312.html</URL>
        <Description>CVE-2015-5312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957105</URL>
        <Description>SUSE Bug 957105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7497.html</URL>
        <Description>CVE-2015-7497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957106</URL>
        <Description>SUSE Bug 957106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.</Note>
    </Notes>
    <CVE>CVE-2015-7498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7498.html</URL>
        <Description>CVE-2015-7498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957107</URL>
        <Description>SUSE Bug 957107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7499.html</URL>
        <Description>CVE-2015-7499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957109</URL>
        <Description>SUSE Bug 957109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.</Note>
    </Notes>
    <CVE>CVE-2015-7500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7500.html</URL>
        <Description>CVE-2015-7500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957110</URL>
        <Description>SUSE Bug 957110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.</Note>
    </Notes>
    <CVE>CVE-2015-7941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7941.html</URL>
        <Description>CVE-2015-7941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951734</URL>
        <Description>SUSE Bug 951734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951735</URL>
        <Description>SUSE Bug 951735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.</Note>
    </Notes>
    <CVE>CVE-2015-7942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7942.html</URL>
        <Description>CVE-2015-7942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951735</URL>
        <Description>SUSE Bug 951735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8035.html</URL>
        <Description>CVE-2015-8035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088279</URL>
        <Description>SUSE Bug 1088279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105166</URL>
        <Description>SUSE Bug 1105166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954429</URL>
        <Description>SUSE Bug 954429</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8242.html</URL>
        <Description>CVE-2015-8242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956021</URL>
        <Description>SUSE Bug 956021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1762</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1762.html</URL>
        <Description>CVE-2016-1762</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981040</URL>
        <Description>SUSE Bug 981040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1833</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1833.html</URL>
        <Description>CVE-2016-1833</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981108</URL>
        <Description>SUSE Bug 981108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1834.html</URL>
        <Description>CVE-2016-1834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981041</URL>
        <Description>SUSE Bug 981041</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1835.html</URL>
        <Description>CVE-2016-1835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981109</URL>
        <Description>SUSE Bug 981109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1836.html</URL>
        <Description>CVE-2016-1836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174862</URL>
        <Description>SUSE Bug 1174862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981110</URL>
        <Description>SUSE Bug 981110</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1837.html</URL>
        <Description>CVE-2016-1837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981111</URL>
        <Description>SUSE Bug 981111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1838</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1838.html</URL>
        <Description>CVE-2016-1838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981112</URL>
        <Description>SUSE Bug 981112</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1839.html</URL>
        <Description>CVE-2016-1839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039069</URL>
        <Description>SUSE Bug 1039069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039661</URL>
        <Description>SUSE Bug 1039661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069433</URL>
        <Description>SUSE Bug 1069433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069690</URL>
        <Description>SUSE Bug 1069690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963963</URL>
        <Description>SUSE Bug 963963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981114</URL>
        <Description>SUSE Bug 981114</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-1840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1840.html</URL>
        <Description>CVE-2016-1840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981115</URL>
        <Description>SUSE Bug 981115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-3627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3627.html</URL>
        <Description>CVE-2016-3627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1026099</URL>
        <Description>SUSE Bug 1026099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1026101</URL>
        <Description>SUSE Bug 1026101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/972335</URL>
        <Description>SUSE Bug 972335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975947</URL>
        <Description>SUSE Bug 975947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.</Note>
    </Notes>
    <CVE>CVE-2016-3705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3705.html</URL>
        <Description>CVE-2016-3705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017497</URL>
        <Description>SUSE Bug 1017497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975947</URL>
        <Description>SUSE Bug 975947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization.  NOTE: this vulnerability may be a duplicate of CVE-2016-3627.</Note>
    </Notes>
    <CVE>CVE-2016-4483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxml2-2-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-2-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-devel-32bit-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-doc-2.9.4-1.22</ProductID>
        <ProductID>openSUSE Tumbleweed:libxml2-tools-2.9.4-1.22</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4483.html</URL>
        <Description>CVE-2016-4483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1026101</URL>
        <Description>SUSE Bug 1026101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978395</URL>
        <Description>SUSE Bug 978395</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
