<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10549-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10549</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2877/</URL>
      <Description>SUSE CVE CVE-2013-2877 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0191/</URL>
      <Description>SUSE CVE CVE-2014-0191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1819/</URL>
      <Description>SUSE CVE CVE-2015-1819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5312/</URL>
      <Description>SUSE CVE CVE-2015-5312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7497/</URL>
      <Description>SUSE CVE CVE-2015-7497 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7498/</URL>
      <Description>SUSE CVE CVE-2015-7498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7499/</URL>
      <Description>SUSE CVE CVE-2015-7499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7500/</URL>
      <Description>SUSE CVE CVE-2015-7500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7941/</URL>
      <Description>SUSE CVE CVE-2015-7941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7942/</URL>
      <Description>SUSE CVE CVE-2015-7942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7995/</URL>
      <Description>SUSE CVE CVE-2015-7995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8035/</URL>
      <Description>SUSE CVE CVE-2015-8035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8241/</URL>
      <Description>SUSE CVE CVE-2015-8241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8242/</URL>
      <Description>SUSE CVE CVE-2015-8242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8317/</URL>
      <Description>SUSE CVE CVE-2015-8317 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-nokogiri-1.6.8.1-1.3">
      <FullProductName ProductID="ruby2.2-rubygem-nokogiri-1.6.8.1-1.3">ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3">
      <FullProductName ProductID="ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3">ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3">
      <FullProductName ProductID="ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3">ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-nokogiri-1.6.8.1-1.3">
      <FullProductName ProductID="ruby2.3-rubygem-nokogiri-1.6.8.1-1.3">ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3">
      <FullProductName ProductID="ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3">ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3">
      <FullProductName ProductID="ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3">ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.2-rubygem-nokogiri-1.6.8.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3">ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3">ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3">ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-nokogiri-1.6.8.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3">ruby2.3-rubygem-nokogiri-1.6.8.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3">ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3">ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.</Note>
    </Notes>
    <CVE>CVE-2013-2877</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2877.html</URL>
        <Description>CVE-2013-2877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/828893</URL>
        <Description>SUSE Bug 828893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/829077</URL>
        <Description>SUSE Bug 829077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854869</URL>
        <Description>SUSE Bug 854869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877506</URL>
        <Description>SUSE Bug 877506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2014-0191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0191.html</URL>
        <Description>CVE-2014-0191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/876652</URL>
        <Description>SUSE Bug 876652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877506</URL>
        <Description>SUSE Bug 877506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996079</URL>
        <Description>SUSE Bug 996079</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.</Note>
    </Notes>
    <CVE>CVE-2015-1819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1819.html</URL>
        <Description>CVE-2015-1819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928193</URL>
        <Description>SUSE Bug 928193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.</Note>
    </Notes>
    <CVE>CVE-2015-5312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5312.html</URL>
        <Description>CVE-2015-5312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957105</URL>
        <Description>SUSE Bug 957105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7497.html</URL>
        <Description>CVE-2015-7497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957106</URL>
        <Description>SUSE Bug 957106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.</Note>
    </Notes>
    <CVE>CVE-2015-7498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7498.html</URL>
        <Description>CVE-2015-7498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957107</URL>
        <Description>SUSE Bug 957107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7499.html</URL>
        <Description>CVE-2015-7499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957109</URL>
        <Description>SUSE Bug 957109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.</Note>
    </Notes>
    <CVE>CVE-2015-7500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7500.html</URL>
        <Description>CVE-2015-7500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957110</URL>
        <Description>SUSE Bug 957110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.</Note>
    </Notes>
    <CVE>CVE-2015-7941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7941.html</URL>
        <Description>CVE-2015-7941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951734</URL>
        <Description>SUSE Bug 951734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951735</URL>
        <Description>SUSE Bug 951735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.</Note>
    </Notes>
    <CVE>CVE-2015-7942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7942.html</URL>
        <Description>CVE-2015-7942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951735</URL>
        <Description>SUSE Bug 951735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.</Note>
    </Notes>
    <CVE>CVE-2015-7995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7995.html</URL>
        <Description>CVE-2015-7995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123130</URL>
        <Description>SUSE Bug 1123130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952474</URL>
        <Description>SUSE Bug 952474</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8035.html</URL>
        <Description>CVE-2015-8035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088279</URL>
        <Description>SUSE Bug 1088279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105166</URL>
        <Description>SUSE Bug 1105166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954429</URL>
        <Description>SUSE Bug 954429</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8241.html</URL>
        <Description>CVE-2015-8241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956018</URL>
        <Description>SUSE Bug 956018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8242.html</URL>
        <Description>CVE-2015-8242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956021</URL>
        <Description>SUSE Bug 956021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.</Note>
    </Notes>
    <CVE>CVE-2015-8317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8317.html</URL>
        <Description>CVE-2015-8317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956260</URL>
        <Description>SUSE Bug 956260</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
