<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libqt4-32bit-4.8.7-5.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10180-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libqt4-32bit-4.8.7-5.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libqt4-32bit-4.8.7-5.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10180</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0945/</URL>
      <Description>SUSE CVE CVE-2009-0945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3193/</URL>
      <Description>SUSE CVE CVE-2011-3193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3922/</URL>
      <Description>SUSE CVE CVE-2011-3922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4929/</URL>
      <Description>SUSE CVE CVE-2012-4929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6093/</URL>
      <Description>SUSE CVE CVE-2012-6093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0254/</URL>
      <Description>SUSE CVE CVE-2013-0254 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4549/</URL>
      <Description>SUSE CVE CVE-2013-4549 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0190/</URL>
      <Description>SUSE CVE CVE-2014-0190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0295/</URL>
      <Description>SUSE CVE CVE-2015-0295 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1858/</URL>
      <Description>SUSE CVE CVE-2015-1858 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1859/</URL>
      <Description>SUSE CVE CVE-2015-1859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1860/</URL>
      <Description>SUSE CVE CVE-2015-1860 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-4.8.7-5.4">
      <FullProductName ProductID="libqt4-4.8.7-5.4">libqt4-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-32bit-4.8.7-5.4">
      <FullProductName ProductID="libqt4-32bit-4.8.7-5.4">libqt4-32bit-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-4.8.7-5.4">
      <FullProductName ProductID="libqt4-devel-4.8.7-5.4">libqt4-devel-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-32bit-4.8.7-5.4">
      <FullProductName ProductID="libqt4-devel-32bit-4.8.7-5.4">libqt4-devel-32bit-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-doc-4.8.7-5.5">
      <FullProductName ProductID="libqt4-devel-doc-4.8.7-5.5">libqt4-devel-doc-4.8.7-5.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-doc-data-4.8.7-5.5">
      <FullProductName ProductID="libqt4-devel-doc-data-4.8.7-5.5">libqt4-devel-doc-data-4.8.7-5.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-linguist-4.8.7-5.4">
      <FullProductName ProductID="libqt4-linguist-4.8.7-5.4">libqt4-linguist-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-private-headers-devel-4.8.7-5.4">
      <FullProductName ProductID="libqt4-private-headers-devel-4.8.7-5.4">libqt4-private-headers-devel-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-qt3support-4.8.7-5.4">
      <FullProductName ProductID="libqt4-qt3support-4.8.7-5.4">libqt4-qt3support-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-qt3support-32bit-4.8.7-5.4">
      <FullProductName ProductID="libqt4-qt3support-32bit-4.8.7-5.4">libqt4-qt3support-32bit-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-4.8.7-5.4">
      <FullProductName ProductID="libqt4-sql-4.8.7-5.4">libqt4-sql-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-32bit-4.8.7-5.4">
      <FullProductName ProductID="libqt4-sql-32bit-4.8.7-5.4">libqt4-sql-32bit-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-mysql-4.8.7-5.3">
      <FullProductName ProductID="libqt4-sql-mysql-4.8.7-5.3">libqt4-sql-mysql-4.8.7-5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-mysql-32bit-4.8.7-5.3">
      <FullProductName ProductID="libqt4-sql-mysql-32bit-4.8.7-5.3">libqt4-sql-mysql-32bit-4.8.7-5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-postgresql-4.8.7-5.3">
      <FullProductName ProductID="libqt4-sql-postgresql-4.8.7-5.3">libqt4-sql-postgresql-4.8.7-5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-postgresql-32bit-4.8.7-5.3">
      <FullProductName ProductID="libqt4-sql-postgresql-32bit-4.8.7-5.3">libqt4-sql-postgresql-32bit-4.8.7-5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-sqlite-4.8.7-5.4">
      <FullProductName ProductID="libqt4-sql-sqlite-4.8.7-5.4">libqt4-sql-sqlite-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-sqlite-32bit-4.8.7-5.4">
      <FullProductName ProductID="libqt4-sql-sqlite-32bit-4.8.7-5.4">libqt4-sql-sqlite-32bit-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-unixODBC-4.8.7-5.3">
      <FullProductName ProductID="libqt4-sql-unixODBC-4.8.7-5.3">libqt4-sql-unixODBC-4.8.7-5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-unixODBC-32bit-4.8.7-5.3">
      <FullProductName ProductID="libqt4-sql-unixODBC-32bit-4.8.7-5.3">libqt4-sql-unixODBC-32bit-4.8.7-5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-x11-4.8.7-5.4">
      <FullProductName ProductID="libqt4-x11-4.8.7-5.4">libqt4-x11-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-x11-32bit-4.8.7-5.4">
      <FullProductName ProductID="libqt4-x11-32bit-4.8.7-5.4">libqt4-x11-32bit-4.8.7-5.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qt4-x11-tools-4.8.7-5.5">
      <FullProductName ProductID="qt4-x11-tools-4.8.7-5.5">qt4-x11-tools-4.8.7-5.5</FullProductName>
    </Branch>
    <Relationship ProductReference="libqt4-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-4.8.7-5.4">libqt4-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-32bit-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4">libqt4-32bit-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-devel-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4">libqt4-devel-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-devel-32bit-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4">libqt4-devel-32bit-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-devel-doc-4.8.7-5.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5">libqt4-devel-doc-4.8.7-5.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-devel-doc-data-4.8.7-5.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5">libqt4-devel-doc-data-4.8.7-5.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-linguist-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4">libqt4-linguist-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-private-headers-devel-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4">libqt4-private-headers-devel-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-qt3support-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4">libqt4-qt3support-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-qt3support-32bit-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4">libqt4-qt3support-32bit-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4">libqt4-sql-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-32bit-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4">libqt4-sql-32bit-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-mysql-4.8.7-5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3">libqt4-sql-mysql-4.8.7-5.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-mysql-32bit-4.8.7-5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3">libqt4-sql-mysql-32bit-4.8.7-5.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-postgresql-4.8.7-5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3">libqt4-sql-postgresql-4.8.7-5.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-postgresql-32bit-4.8.7-5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3">libqt4-sql-postgresql-32bit-4.8.7-5.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-sqlite-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4">libqt4-sql-sqlite-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-sqlite-32bit-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4">libqt4-sql-sqlite-32bit-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-unixODBC-4.8.7-5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3">libqt4-sql-unixODBC-4.8.7-5.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-sql-unixODBC-32bit-4.8.7-5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3">libqt4-sql-unixODBC-32bit-4.8.7-5.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-x11-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4">libqt4-x11-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt4-x11-32bit-4.8.7-5.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4">libqt4-x11-32bit-4.8.7-5.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qt4-x11-tools-4.8.7-5.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5">qt4-x11-tools-4.8.7-5.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.</Note>
    </Notes>
    <CVE>CVE-2009-0945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0945.html</URL>
        <Description>CVE-2009-0945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/512559</URL>
        <Description>SUSE Bug 512559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/515124</URL>
        <Description>SUSE Bug 515124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/541632</URL>
        <Description>SUSE Bug 541632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/601349</URL>
        <Description>SUSE Bug 601349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/644114</URL>
        <Description>SUSE Bug 644114</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.</Note>
    </Notes>
    <CVE>CVE-2011-3193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3193.html</URL>
        <Description>CVE-2011-3193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/714984</URL>
        <Description>SUSE Bug 714984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.</Note>
    </Notes>
    <CVE>CVE-2011-3922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3922.html</URL>
        <Description>CVE-2011-3922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739904</URL>
        <Description>SUSE Bug 739904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/740493</URL>
        <Description>SUSE Bug 740493</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.</Note>
    </Notes>
    <CVE>CVE-2012-4929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4929.html</URL>
        <Description>CVE-2012-4929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/779952</URL>
        <Description>SUSE Bug 779952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/793420</URL>
        <Description>SUSE Bug 793420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/803004</URL>
        <Description>SUSE Bug 803004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847895</URL>
        <Description>SUSE Bug 847895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.</Note>
    </Notes>
    <CVE>CVE-2012-6093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6093.html</URL>
        <Description>CVE-2012-6093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/797006</URL>
        <Description>SUSE Bug 797006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/802634</URL>
        <Description>SUSE Bug 802634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.</Note>
    </Notes>
    <CVE>CVE-2013-0254</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0254.html</URL>
        <Description>CVE-2013-0254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/802634</URL>
        <Description>SUSE Bug 802634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.</Note>
    </Notes>
    <CVE>CVE-2013-4549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4549.html</URL>
        <Description>CVE-2013-4549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039291</URL>
        <Description>SUSE Bug 1039291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856832</URL>
        <Description>SUSE Bug 856832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.</Note>
    </Notes>
    <CVE>CVE-2014-0190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0190.html</URL>
        <Description>CVE-2014-0190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/875470</URL>
        <Description>SUSE Bug 875470</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.</Note>
    </Notes>
    <CVE>CVE-2015-0295</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0295.html</URL>
        <Description>CVE-2015-0295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/921999</URL>
        <Description>SUSE Bug 921999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927806</URL>
        <Description>SUSE Bug 927806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927807</URL>
        <Description>SUSE Bug 927807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927808</URL>
        <Description>SUSE Bug 927808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936523</URL>
        <Description>SUSE Bug 936523</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.</Note>
    </Notes>
    <CVE>CVE-2015-1858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1858.html</URL>
        <Description>CVE-2015-1858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/921999</URL>
        <Description>SUSE Bug 921999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927806</URL>
        <Description>SUSE Bug 927806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927807</URL>
        <Description>SUSE Bug 927807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927808</URL>
        <Description>SUSE Bug 927808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.</Note>
    </Notes>
    <CVE>CVE-2015-1859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1859.html</URL>
        <Description>CVE-2015-1859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/921999</URL>
        <Description>SUSE Bug 921999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927806</URL>
        <Description>SUSE Bug 927806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927807</URL>
        <Description>SUSE Bug 927807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927808</URL>
        <Description>SUSE Bug 927808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.</Note>
    </Notes>
    <CVE>CVE-2015-1860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1860.html</URL>
        <Description>CVE-2015-1860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/921999</URL>
        <Description>SUSE Bug 921999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927806</URL>
        <Description>SUSE Bug 927806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927807</URL>
        <Description>SUSE Bug 927807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927808</URL>
        <Description>SUSE Bug 927808</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
