<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">cups-2.1.3-2.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10075</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">cups-2.1.3-2.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the cups-2.1.3-2.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10075</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10075</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0163/</URL>
      <Description>SUSE CVE CVE-2009-0163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2820/</URL>
      <Description>SUSE CVE CVE-2009-2820 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3553/</URL>
      <Description>SUSE CVE CVE-2009-3553 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0393/</URL>
      <Description>SUSE CVE CVE-2010-0393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0540/</URL>
      <Description>SUSE CVE CVE-2010-0540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0542/</URL>
      <Description>SUSE CVE CVE-2010-0542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1748/</URL>
      <Description>SUSE CVE CVE-2010-1748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2941/</URL>
      <Description>SUSE CVE CVE-2010-2941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5519/</URL>
      <Description>SUSE CVE CVE-2012-5519 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6094/</URL>
      <Description>SUSE CVE CVE-2012-6094 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2856/</URL>
      <Description>SUSE CVE CVE-2014-2856 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3537/</URL>
      <Description>SUSE CVE CVE-2014-3537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5029/</URL>
      <Description>SUSE CVE CVE-2014-5029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5030/</URL>
      <Description>SUSE CVE CVE-2014-5030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5031/</URL>
      <Description>SUSE CVE CVE-2014-5031 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1158/</URL>
      <Description>SUSE CVE CVE-2015-1158 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1159/</URL>
      <Description>SUSE CVE CVE-2015-1159 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cups-2.1.3-2.3">
      <FullProductName ProductID="cups-2.1.3-2.3">cups-2.1.3-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-client-2.1.3-2.3">
      <FullProductName ProductID="cups-client-2.1.3-2.3">cups-client-2.1.3-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-ddk-2.1.3-2.3">
      <FullProductName ProductID="cups-ddk-2.1.3-2.3">cups-ddk-2.1.3-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-devel-2.1.3-2.3">
      <FullProductName ProductID="cups-devel-2.1.3-2.3">cups-devel-2.1.3-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-devel-32bit-2.1.3-2.3">
      <FullProductName ProductID="cups-devel-32bit-2.1.3-2.3">cups-devel-32bit-2.1.3-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-libs-2.1.3-2.3">
      <FullProductName ProductID="cups-libs-2.1.3-2.3">cups-libs-2.1.3-2.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-libs-32bit-2.1.3-2.3">
      <FullProductName ProductID="cups-libs-32bit-2.1.3-2.3">cups-libs-32bit-2.1.3-2.3</FullProductName>
    </Branch>
    <Relationship ProductReference="cups-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-2.1.3-2.3">cups-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-client-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-client-2.1.3-2.3">cups-client-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-ddk-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-ddk-2.1.3-2.3">cups-ddk-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-devel-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-devel-2.1.3-2.3">cups-devel-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-devel-32bit-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3">cups-devel-32bit-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-libs-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-libs-2.1.3-2.3">cups-libs-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-libs-32bit-2.1.3-2.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3">cups-libs-32bit-2.1.3-2.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2009-0163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0163.html</URL>
        <Description>CVE-2009-0163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/485895</URL>
        <Description>SUSE Bug 485895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.</Note>
    </Notes>
    <CVE>CVE-2009-2820</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2820.html</URL>
        <Description>CVE-2009-2820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/548317</URL>
        <Description>SUSE Bug 548317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/551563</URL>
        <Description>SUSE Bug 551563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/574336</URL>
        <Description>SUSE Bug 574336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2009-3553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3553.html</URL>
        <Description>CVE-2009-3553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/554861</URL>
        <Description>SUSE Bug 554861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/574336</URL>
        <Description>SUSE Bug 574336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/578215</URL>
        <Description>SUSE Bug 578215</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.</Note>
    </Notes>
    <CVE>CVE-2010-0393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0393.html</URL>
        <Description>CVE-2010-0393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/574336</URL>
        <Description>SUSE Bug 574336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.</Note>
    </Notes>
    <CVE>CVE-2010-0540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0540.html</URL>
        <Description>CVE-2010-0540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/601830</URL>
        <Description>SUSE Bug 601830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/671735</URL>
        <Description>SUSE Bug 671735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/680210</URL>
        <Description>SUSE Bug 680210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/680212</URL>
        <Description>SUSE Bug 680212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/700987</URL>
        <Description>SUSE Bug 700987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/711490</URL>
        <Description>SUSE Bug 711490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/715643</URL>
        <Description>SUSE Bug 715643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/748422</URL>
        <Description>SUSE Bug 748422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2010-0542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0542.html</URL>
        <Description>CVE-2010-0542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/601352</URL>
        <Description>SUSE Bug 601352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/644521</URL>
        <Description>SUSE Bug 644521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/657780</URL>
        <Description>SUSE Bug 657780</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.</Note>
    </Notes>
    <CVE>CVE-2010-1748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1748.html</URL>
        <Description>CVE-2010-1748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/601352</URL>
        <Description>SUSE Bug 601352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604271</URL>
        <Description>SUSE Bug 604271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/644521</URL>
        <Description>SUSE Bug 644521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/649256</URL>
        <Description>SUSE Bug 649256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/657780</URL>
        <Description>SUSE Bug 657780</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.</Note>
    </Notes>
    <CVE>CVE-2010-2941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2941.html</URL>
        <Description>CVE-2010-2941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/649256</URL>
        <Description>SUSE Bug 649256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/654627</URL>
        <Description>SUSE Bug 654627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.</Note>
    </Notes>
    <CVE>CVE-2012-5519</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5519.html</URL>
        <Description>CVE-2012-5519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180148</URL>
        <Description>SUSE Bug 1180148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789566</URL>
        <Description>SUSE Bug 789566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882905</URL>
        <Description>SUSE Bug 882905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924208</URL>
        <Description>SUSE Bug 924208</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system</Note>
    </Notes>
    <CVE>CVE-2012-6094</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6094.html</URL>
        <Description>CVE-2012-6094</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/795624</URL>
        <Description>SUSE Bug 795624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/857372</URL>
        <Description>SUSE Bug 857372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.</Note>
    </Notes>
    <CVE>CVE-2014-2856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2856.html</URL>
        <Description>CVE-2014-2856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873899</URL>
        <Description>SUSE Bug 873899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.</Note>
    </Notes>
    <CVE>CVE-2014-3537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3537.html</URL>
        <Description>CVE-2014-3537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887240</URL>
        <Description>SUSE Bug 887240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.</Note>
    </Notes>
    <CVE>CVE-2014-5029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5029.html</URL>
        <Description>CVE-2014-5029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887240</URL>
        <Description>SUSE Bug 887240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.</Note>
    </Notes>
    <CVE>CVE-2014-5030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5030.html</URL>
        <Description>CVE-2014-5030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887240</URL>
        <Description>SUSE Bug 887240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-5031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5031.html</URL>
        <Description>CVE-2014-5031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887240</URL>
        <Description>SUSE Bug 887240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2015-1158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1158.html</URL>
        <Description>CVE-2015-1158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924208</URL>
        <Description>SUSE Bug 924208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976653</URL>
        <Description>SUSE Bug 976653</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.</Note>
    </Notes>
    <CVE>CVE-2015-1159</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-2.1.3-2.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-libs-32bit-2.1.3-2.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1159.html</URL>
        <Description>CVE-2015-1159</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924208</URL>
        <Description>SUSE Bug 924208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976653</URL>
        <Description>SUSE Bug 976653</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
