<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpoppler-cpp0-0.49.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10360-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpoppler-cpp0-0.49.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpoppler-cpp0-0.49.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10360</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0799/</URL>
      <Description>SUSE CVE CVE-2009-0799 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0800/</URL>
      <Description>SUSE CVE CVE-2009-0800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1179/</URL>
      <Description>SUSE CVE CVE-2009-1179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1180/</URL>
      <Description>SUSE CVE CVE-2009-1180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1181/</URL>
      <Description>SUSE CVE CVE-2009-1181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1182/</URL>
      <Description>SUSE CVE CVE-2009-1182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1183/</URL>
      <Description>SUSE CVE CVE-2009-1183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1187/</URL>
      <Description>SUSE CVE CVE-2009-1187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1188/</URL>
      <Description>SUSE CVE CVE-2009-1188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3607/</URL>
      <Description>SUSE CVE CVE-2009-3607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3608/</URL>
      <Description>SUSE CVE CVE-2009-3608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1788/</URL>
      <Description>SUSE CVE CVE-2013-1788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1789/</URL>
      <Description>SUSE CVE CVE-2013-1789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1790/</URL>
      <Description>SUSE CVE CVE-2013-1790 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4473/</URL>
      <Description>SUSE CVE CVE-2013-4473 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4474/</URL>
      <Description>SUSE CVE CVE-2013-4474 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-cpp0-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-cpp0-0.49.0-1.1">libpoppler-cpp0-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-cpp0-32bit-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-cpp0-32bit-0.49.0-1.1">libpoppler-cpp0-32bit-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-devel-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-devel-0.49.0-1.1">libpoppler-devel-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-glib-devel-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-glib-devel-0.49.0-1.1">libpoppler-glib-devel-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-glib8-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-glib8-0.49.0-1.1">libpoppler-glib8-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-glib8-32bit-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-glib8-32bit-0.49.0-1.1">libpoppler-glib8-32bit-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-qt4-4-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-qt4-4-0.49.0-1.1">libpoppler-qt4-4-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-qt4-4-32bit-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-qt4-4-32bit-0.49.0-1.1">libpoppler-qt4-4-32bit-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-qt4-devel-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-qt4-devel-0.49.0-1.1">libpoppler-qt4-devel-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-qt5-1-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-qt5-1-0.49.0-1.1">libpoppler-qt5-1-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-qt5-1-32bit-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-qt5-1-32bit-0.49.0-1.1">libpoppler-qt5-1-32bit-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-qt5-devel-0.49.0-1.1">
      <FullProductName ProductID="libpoppler-qt5-devel-0.49.0-1.1">libpoppler-qt5-devel-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler65-0.49.0-1.1">
      <FullProductName ProductID="libpoppler65-0.49.0-1.1">libpoppler65-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler65-32bit-0.49.0-1.1">
      <FullProductName ProductID="libpoppler65-32bit-0.49.0-1.1">libpoppler65-32bit-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="poppler-tools-0.49.0-1.1">
      <FullProductName ProductID="poppler-tools-0.49.0-1.1">poppler-tools-0.49.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Poppler-0_18-0.49.0-1.1">
      <FullProductName ProductID="typelib-1_0-Poppler-0_18-0.49.0-1.1">typelib-1_0-Poppler-0_18-0.49.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpoppler-cpp0-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1">libpoppler-cpp0-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-cpp0-32bit-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1">libpoppler-cpp0-32bit-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-devel-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1">libpoppler-devel-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-glib-devel-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1">libpoppler-glib-devel-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-glib8-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1">libpoppler-glib8-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-glib8-32bit-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1">libpoppler-glib8-32bit-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-qt4-4-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1">libpoppler-qt4-4-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-qt4-4-32bit-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1">libpoppler-qt4-4-32bit-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-qt4-devel-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1">libpoppler-qt4-devel-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-qt5-1-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1">libpoppler-qt5-1-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-qt5-1-32bit-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1">libpoppler-qt5-1-32bit-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-qt5-devel-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1">libpoppler-qt5-devel-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler65-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler65-0.49.0-1.1">libpoppler65-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler65-32bit-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1">libpoppler65-32bit-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="poppler-tools-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:poppler-tools-0.49.0-1.1">poppler-tools-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Poppler-0_18-0.49.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1">typelib-1_0-Poppler-0_18-0.49.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2009-0799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0799.html</URL>
        <Description>CVE-2009-0799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2009-0800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0800.html</URL>
        <Description>CVE-2009-0800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2009-1179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1179.html</URL>
        <Description>CVE-2009-1179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.</Note>
    </Notes>
    <CVE>CVE-2009-1180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1180.html</URL>
        <Description>CVE-2009-1180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2009-1181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1181.html</URL>
        <Description>CVE-2009-1181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2009-1182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1182.html</URL>
        <Description>CVE-2009-1182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2009-1183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1183.html</URL>
        <Description>CVE-2009-1183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).</Note>
    </Notes>
    <CVE>CVE-2009-1187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1187.html</URL>
        <Description>CVE-2009-1187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/508153</URL>
        <Description>SUSE Bug 508153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/508154</URL>
        <Description>SUSE Bug 508154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/539875</URL>
        <Description>SUSE Bug 539875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/566697</URL>
        <Description>SUSE Bug 566697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2009-1188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1188.html</URL>
        <Description>CVE-2009-1188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/487100</URL>
        <Description>SUSE Bug 487100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/508153</URL>
        <Description>SUSE Bug 508153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/508154</URL>
        <Description>SUSE Bug 508154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/539875</URL>
        <Description>SUSE Bug 539875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/546400</URL>
        <Description>SUSE Bug 546400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/566697</URL>
        <Description>SUSE Bug 566697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2009-3607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3607.html</URL>
        <Description>CVE-2009-3607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/546393</URL>
        <Description>SUSE Bug 546393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/566697</URL>
        <Description>SUSE Bug 566697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2009-3608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3608.html</URL>
        <Description>CVE-2009-3608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/543090</URL>
        <Description>SUSE Bug 543090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/543410</URL>
        <Description>SUSE Bug 543410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/546400</URL>
        <Description>SUSE Bug 546400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/546404</URL>
        <Description>SUSE Bug 546404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/556049</URL>
        <Description>SUSE Bug 556049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/566697</URL>
        <Description>SUSE Bug 566697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.</Note>
    </Notes>
    <CVE>CVE-2013-1788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1788.html</URL>
        <Description>CVE-2013-1788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/806793</URL>
        <Description>SUSE Bug 806793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.</Note>
    </Notes>
    <CVE>CVE-2013-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1789.html</URL>
        <Description>CVE-2013-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/806793</URL>
        <Description>SUSE Bug 806793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.</Note>
    </Notes>
    <CVE>CVE-2013-1790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1790.html</URL>
        <Description>CVE-2013-1790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/806793</URL>
        <Description>SUSE Bug 806793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.</Note>
    </Notes>
    <CVE>CVE-2013-4473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4473.html</URL>
        <Description>CVE-2013-4473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847907</URL>
        <Description>SUSE Bug 847907</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.</Note>
    </Notes>
    <CVE>CVE-2013-4474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-0.49.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4474.html</URL>
        <Description>CVE-2013-4474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847907</URL>
        <Description>SUSE Bug 847907</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
