<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">w3m-0.5.3.git20161120-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10235</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">w3m-0.5.3.git20161120-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the w3m-0.5.3.git20161120-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10235</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2074/</URL>
      <Description>SUSE CVE CVE-2010-2074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4929/</URL>
      <Description>SUSE CVE CVE-2012-4929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9434/</URL>
      <Description>SUSE CVE CVE-2016-9434 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9435/</URL>
      <Description>SUSE CVE CVE-2016-9435 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9436/</URL>
      <Description>SUSE CVE CVE-2016-9436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9437/</URL>
      <Description>SUSE CVE CVE-2016-9437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9438/</URL>
      <Description>SUSE CVE CVE-2016-9438 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9439/</URL>
      <Description>SUSE CVE CVE-2016-9439 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9440/</URL>
      <Description>SUSE CVE CVE-2016-9440 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9441/</URL>
      <Description>SUSE CVE CVE-2016-9441 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9442/</URL>
      <Description>SUSE CVE CVE-2016-9442 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9443/</URL>
      <Description>SUSE CVE CVE-2016-9443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9621/</URL>
      <Description>SUSE CVE CVE-2016-9621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9622/</URL>
      <Description>SUSE CVE CVE-2016-9622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9623/</URL>
      <Description>SUSE CVE CVE-2016-9623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9624/</URL>
      <Description>SUSE CVE CVE-2016-9624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9625/</URL>
      <Description>SUSE CVE CVE-2016-9625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9626/</URL>
      <Description>SUSE CVE CVE-2016-9626 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9627/</URL>
      <Description>SUSE CVE CVE-2016-9627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9628/</URL>
      <Description>SUSE CVE CVE-2016-9628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9629/</URL>
      <Description>SUSE CVE CVE-2016-9629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9630/</URL>
      <Description>SUSE CVE CVE-2016-9630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9631/</URL>
      <Description>SUSE CVE CVE-2016-9631 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9632/</URL>
      <Description>SUSE CVE CVE-2016-9632 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9633/</URL>
      <Description>SUSE CVE CVE-2016-9633 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="w3m-0.5.3.git20161120-1.1">
      <FullProductName ProductID="w3m-0.5.3.git20161120-1.1">w3m-0.5.3.git20161120-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="w3m-inline-image-0.5.3.git20161120-1.1">
      <FullProductName ProductID="w3m-inline-image-0.5.3.git20161120-1.1">w3m-inline-image-0.5.3.git20161120-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="w3m-0.5.3.git20161120-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1">w3m-0.5.3.git20161120-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="w3m-inline-image-0.5.3.git20161120-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1">w3m-inline-image-0.5.3.git20161120-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</Note>
    </Notes>
    <CVE>CVE-2010-2074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2074.html</URL>
        <Description>CVE-2010-2074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/609451</URL>
        <Description>SUSE Bug 609451</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.</Note>
    </Notes>
    <CVE>CVE-2012-4929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4929.html</URL>
        <Description>CVE-2012-4929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/779952</URL>
        <Description>SUSE Bug 779952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/793420</URL>
        <Description>SUSE Bug 793420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/803004</URL>
        <Description>SUSE Bug 803004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847895</URL>
        <Description>SUSE Bug 847895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9434</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9434.html</URL>
        <Description>CVE-2016-9434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011283</URL>
        <Description>SUSE Bug 1011283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to &lt;dd&gt; tags.</Note>
    </Notes>
    <CVE>CVE-2016-9435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9435.html</URL>
        <Description>CVE-2016-9435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011284</URL>
        <Description>SUSE Bug 1011284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a &lt;i&gt; tag.</Note>
    </Notes>
    <CVE>CVE-2016-9436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9436.html</URL>
        <Description>CVE-2016-9436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011285</URL>
        <Description>SUSE Bug 1011285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9437.html</URL>
        <Description>CVE-2016-9437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011286</URL>
        <Description>SUSE Bug 1011286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9438</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9438.html</URL>
        <Description>CVE-2016-9438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011287</URL>
        <Description>SUSE Bug 1011287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9439.html</URL>
        <Description>CVE-2016-9439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011288</URL>
        <Description>SUSE Bug 1011288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9440.html</URL>
        <Description>CVE-2016-9440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011289</URL>
        <Description>SUSE Bug 1011289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9441.html</URL>
        <Description>CVE-2016-9441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011290</URL>
        <Description>SUSE Bug 1011290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9442</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9442.html</URL>
        <Description>CVE-2016-9442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011291</URL>
        <Description>SUSE Bug 1011291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9443.html</URL>
        <Description>CVE-2016-9443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011292</URL>
        <Description>SUSE Bug 1011292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9429.  Reason: This candidate is a reservation duplicate of CVE-2016-9429.  Notes: All CVE users should reference CVE-2016-9429 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-9621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9621.html</URL>
        <Description>CVE-2016-9621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011278</URL>
        <Description>SUSE Bug 1011278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012020</URL>
        <Description>SUSE Bug 1012020</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9622.html</URL>
        <Description>CVE-2016-9622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012021</URL>
        <Description>SUSE Bug 1012021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9623.html</URL>
        <Description>CVE-2016-9623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012022</URL>
        <Description>SUSE Bug 1012022</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9624.html</URL>
        <Description>CVE-2016-9624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012023</URL>
        <Description>SUSE Bug 1012023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9625.html</URL>
        <Description>CVE-2016-9625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012024</URL>
        <Description>SUSE Bug 1012024</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9626.html</URL>
        <Description>CVE-2016-9626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012025</URL>
        <Description>SUSE Bug 1012025</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9627.html</URL>
        <Description>CVE-2016-9627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012026</URL>
        <Description>SUSE Bug 1012026</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9628.html</URL>
        <Description>CVE-2016-9628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012027</URL>
        <Description>SUSE Bug 1012027</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9629.html</URL>
        <Description>CVE-2016-9629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012028</URL>
        <Description>SUSE Bug 1012028</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9630.html</URL>
        <Description>CVE-2016-9630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012029</URL>
        <Description>SUSE Bug 1012029</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9631.html</URL>
        <Description>CVE-2016-9631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012030</URL>
        <Description>SUSE Bug 1012030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9632.html</URL>
        <Description>CVE-2016-9632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012031</URL>
        <Description>SUSE Bug 1012031</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9633.html</URL>
        <Description>CVE-2016-9633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012032</URL>
        <Description>SUSE Bug 1012032</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
