<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ruby2.7-rubygem-nokogiri-1.12.3-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11340</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ruby2.7-rubygem-nokogiri-1.12.3-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ruby2.7-rubygem-nokogiri-1.12.3-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11340</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11340</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2877/</URL>
      <Description>SUSE CVE CVE-2013-2877 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0191/</URL>
      <Description>SUSE CVE CVE-2014-0191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1819/</URL>
      <Description>SUSE CVE CVE-2015-1819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5312/</URL>
      <Description>SUSE CVE CVE-2015-5312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7497/</URL>
      <Description>SUSE CVE CVE-2015-7497 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7498/</URL>
      <Description>SUSE CVE CVE-2015-7498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7499/</URL>
      <Description>SUSE CVE CVE-2015-7499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7500/</URL>
      <Description>SUSE CVE CVE-2015-7500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7941/</URL>
      <Description>SUSE CVE CVE-2015-7941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7942/</URL>
      <Description>SUSE CVE CVE-2015-7942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7995/</URL>
      <Description>SUSE CVE CVE-2015-7995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8035/</URL>
      <Description>SUSE CVE CVE-2015-8035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8241/</URL>
      <Description>SUSE CVE CVE-2015-8241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8242/</URL>
      <Description>SUSE CVE CVE-2015-8242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8317/</URL>
      <Description>SUSE CVE CVE-2015-8317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4658/</URL>
      <Description>SUSE CVE CVE-2016-4658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4738/</URL>
      <Description>SUSE CVE CVE-2016-4738 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5131/</URL>
      <Description>SUSE CVE CVE-2016-5131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15412/</URL>
      <Description>SUSE CVE CVE-2017-15412 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5029/</URL>
      <Description>SUSE CVE CVE-2017-5029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14404/</URL>
      <Description>SUSE CVE CVE-2018-14404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8048/</URL>
      <Description>SUSE CVE CVE-2018-8048 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11068/</URL>
      <Description>SUSE CVE CVE-2019-11068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20388/</URL>
      <Description>SUSE CVE CVE-2019-20388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5477/</URL>
      <Description>SUSE CVE CVE-2019-5477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24977/</URL>
      <Description>SUSE CVE CVE-2020-24977 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7595/</URL>
      <Description>SUSE CVE CVE-2020-7595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3516/</URL>
      <Description>SUSE CVE CVE-2021-3516 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3517/</URL>
      <Description>SUSE CVE CVE-2021-3517 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3518/</URL>
      <Description>SUSE CVE CVE-2021-3518 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3537/</URL>
      <Description>SUSE CVE CVE-2021-3537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3541/</URL>
      <Description>SUSE CVE CVE-2021-3541 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.7-rubygem-nokogiri-1.12.3-1.2">
      <FullProductName ProductID="ruby2.7-rubygem-nokogiri-1.12.3-1.2">ruby2.7-rubygem-nokogiri-1.12.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby3.0-rubygem-nokogiri-1.12.3-1.2">
      <FullProductName ProductID="ruby3.0-rubygem-nokogiri-1.12.3-1.2">ruby3.0-rubygem-nokogiri-1.12.3-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.7-rubygem-nokogiri-1.12.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2">ruby2.7-rubygem-nokogiri-1.12.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby3.0-rubygem-nokogiri-1.12.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2">ruby3.0-rubygem-nokogiri-1.12.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.</Note>
    </Notes>
    <CVE>CVE-2013-2877</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2877.html</URL>
        <Description>CVE-2013-2877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/828893</URL>
        <Description>SUSE Bug 828893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/829077</URL>
        <Description>SUSE Bug 829077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854869</URL>
        <Description>SUSE Bug 854869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877506</URL>
        <Description>SUSE Bug 877506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2014-0191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0191.html</URL>
        <Description>CVE-2014-0191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/876652</URL>
        <Description>SUSE Bug 876652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877506</URL>
        <Description>SUSE Bug 877506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996079</URL>
        <Description>SUSE Bug 996079</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.</Note>
    </Notes>
    <CVE>CVE-2015-1819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1819.html</URL>
        <Description>CVE-2015-1819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928193</URL>
        <Description>SUSE Bug 928193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.</Note>
    </Notes>
    <CVE>CVE-2015-5312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5312.html</URL>
        <Description>CVE-2015-5312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957105</URL>
        <Description>SUSE Bug 957105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7497.html</URL>
        <Description>CVE-2015-7497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957106</URL>
        <Description>SUSE Bug 957106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.</Note>
    </Notes>
    <CVE>CVE-2015-7498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7498.html</URL>
        <Description>CVE-2015-7498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957107</URL>
        <Description>SUSE Bug 957107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7499.html</URL>
        <Description>CVE-2015-7499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957109</URL>
        <Description>SUSE Bug 957109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.</Note>
    </Notes>
    <CVE>CVE-2015-7500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7500.html</URL>
        <Description>CVE-2015-7500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957110</URL>
        <Description>SUSE Bug 957110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.</Note>
    </Notes>
    <CVE>CVE-2015-7941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7941.html</URL>
        <Description>CVE-2015-7941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951734</URL>
        <Description>SUSE Bug 951734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951735</URL>
        <Description>SUSE Bug 951735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.</Note>
    </Notes>
    <CVE>CVE-2015-7942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7942.html</URL>
        <Description>CVE-2015-7942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951735</URL>
        <Description>SUSE Bug 951735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.</Note>
    </Notes>
    <CVE>CVE-2015-7995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7995.html</URL>
        <Description>CVE-2015-7995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123130</URL>
        <Description>SUSE Bug 1123130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952474</URL>
        <Description>SUSE Bug 952474</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8035.html</URL>
        <Description>CVE-2015-8035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088279</URL>
        <Description>SUSE Bug 1088279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105166</URL>
        <Description>SUSE Bug 1105166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954429</URL>
        <Description>SUSE Bug 954429</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8241.html</URL>
        <Description>CVE-2015-8241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956018</URL>
        <Description>SUSE Bug 956018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.</Note>
    </Notes>
    <CVE>CVE-2015-8242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8242.html</URL>
        <Description>CVE-2015-8242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956021</URL>
        <Description>SUSE Bug 956021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.</Note>
    </Notes>
    <CVE>CVE-2015-8317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8317.html</URL>
        <Description>CVE-2015-8317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956260</URL>
        <Description>SUSE Bug 956260</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959469</URL>
        <Description>SUSE Bug 959469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969769</URL>
        <Description>SUSE Bug 969769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-4658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4658.html</URL>
        <Description>CVE-2016-4658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005544</URL>
        <Description>SUSE Bug 1005544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069433</URL>
        <Description>SUSE Bug 1069433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078813</URL>
        <Description>SUSE Bug 1078813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-4738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4738.html</URL>
        <Description>CVE-2016-4738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005591</URL>
        <Description>SUSE Bug 1005591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123130</URL>
        <Description>SUSE Bug 1123130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.</Note>
    </Notes>
    <CVE>CVE-2016-5131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5131.html</URL>
        <Description>CVE-2016-5131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069433</URL>
        <Description>SUSE Bug 1069433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078813</URL>
        <Description>SUSE Bug 1078813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989901</URL>
        <Description>SUSE Bug 989901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-15412</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15412.html</URL>
        <Description>CVE-2017-15412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071691</URL>
        <Description>SUSE Bug 1071691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077993</URL>
        <Description>SUSE Bug 1077993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123129</URL>
        <Description>SUSE Bug 1123129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5029.html</URL>
        <Description>CVE-2017-5029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028848</URL>
        <Description>SUSE Bug 1028848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028875</URL>
        <Description>SUSE Bug 1028875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1035905</URL>
        <Description>SUSE Bug 1035905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123130</URL>
        <Description>SUSE Bug 1123130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.</Note>
    </Notes>
    <CVE>CVE-2018-14404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14404.html</URL>
        <Description>CVE-2018-14404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102046</URL>
        <Description>SUSE Bug 1102046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148896</URL>
        <Description>SUSE Bug 1148896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.</Note>
    </Notes>
    <CVE>CVE-2018-8048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8048.html</URL>
        <Description>CVE-2018-8048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085967</URL>
        <Description>SUSE Bug 1085967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086598</URL>
        <Description>SUSE Bug 1086598</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.</Note>
    </Notes>
    <CVE>CVE-2019-11068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11068.html</URL>
        <Description>CVE-2019-11068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132160</URL>
        <Description>SUSE Bug 1132160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.</Note>
    </Notes>
    <CVE>CVE-2019-20388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20388.html</URL>
        <Description>CVE-2019-20388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161521</URL>
        <Description>SUSE Bug 1161521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.</Note>
    </Notes>
    <CVE>CVE-2019-5477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5477.html</URL>
        <Description>CVE-2019-5477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146578</URL>
        <Description>SUSE Bug 1146578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.</Note>
    </Notes>
    <CVE>CVE-2020-24977</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24977.html</URL>
        <Description>CVE-2020-24977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176179</URL>
        <Description>SUSE Bug 1176179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.</Note>
    </Notes>
    <CVE>CVE-2020-7595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7595.html</URL>
        <Description>CVE-2020-7595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161517</URL>
        <Description>SUSE Bug 1161517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.</Note>
    </Notes>
    <CVE>CVE-2021-3516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3516.html</URL>
        <Description>CVE-2021-3516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185409</URL>
        <Description>SUSE Bug 1185409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.</Note>
    </Notes>
    <CVE>CVE-2021-3517</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3517.html</URL>
        <Description>CVE-2021-3517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185410</URL>
        <Description>SUSE Bug 1185410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194438</URL>
        <Description>SUSE Bug 1194438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196383</URL>
        <Description>SUSE Bug 1196383</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.</Note>
    </Notes>
    <CVE>CVE-2021-3518</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3518.html</URL>
        <Description>CVE-2021-3518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185408</URL>
        <Description>SUSE Bug 1185408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3537.html</URL>
        <Description>CVE-2021-3537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185698</URL>
        <Description>SUSE Bug 1185698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.</Note>
    </Notes>
    <CVE>CVE-2021-3541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-nokogiri-1.12.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-nokogiri-1.12.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3541.html</URL>
        <Description>CVE-2021-3541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186015</URL>
        <Description>SUSE Bug 1186015</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
