<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">gdk-pixbuf-devel-2.36.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10453-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">gdk-pixbuf-devel-2.36.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the gdk-pixbuf-devel-2.36.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10453</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2485/</URL>
      <Description>SUSE CVE CVE-2011-2485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4491/</URL>
      <Description>SUSE CVE CVE-2015-4491 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7552/</URL>
      <Description>SUSE CVE CVE-2015-7552 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7673/</URL>
      <Description>SUSE CVE CVE-2015-7673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7674/</URL>
      <Description>SUSE CVE CVE-2015-7674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6352/</URL>
      <Description>SUSE CVE CVE-2016-6352 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-devel-2.36.0-1.1">
      <FullProductName ProductID="gdk-pixbuf-devel-2.36.0-1.1">gdk-pixbuf-devel-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-devel-32bit-2.36.0-1.1">
      <FullProductName ProductID="gdk-pixbuf-devel-32bit-2.36.0-1.1">gdk-pixbuf-devel-32bit-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-lang-2.36.0-1.1">
      <FullProductName ProductID="gdk-pixbuf-lang-2.36.0-1.1">gdk-pixbuf-lang-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-query-loaders-2.36.0-1.1">
      <FullProductName ProductID="gdk-pixbuf-query-loaders-2.36.0-1.1">gdk-pixbuf-query-loaders-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-query-loaders-32bit-2.36.0-1.1">
      <FullProductName ProductID="gdk-pixbuf-query-loaders-32bit-2.36.0-1.1">gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgdk_pixbuf-2_0-0-2.36.0-1.1">
      <FullProductName ProductID="libgdk_pixbuf-2_0-0-2.36.0-1.1">libgdk_pixbuf-2_0-0-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1">
      <FullProductName ProductID="libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1">libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1">
      <FullProductName ProductID="typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1">typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gdk-pixbuf-devel-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1">gdk-pixbuf-devel-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-devel-32bit-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1">gdk-pixbuf-devel-32bit-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-lang-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1">gdk-pixbuf-lang-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-query-loaders-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1">gdk-pixbuf-query-loaders-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-query-loaders-32bit-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1">gdk-pixbuf-query-loaders-32bit-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgdk_pixbuf-2_0-0-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1">libgdk_pixbuf-2_0-0-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1">libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1">typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.</Note>
    </Notes>
    <CVE>CVE-2011-2485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2485.html</URL>
        <Description>CVE-2011-2485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/702028</URL>
        <Description>SUSE Bug 702028</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.</Note>
    </Notes>
    <CVE>CVE-2015-4491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4491.html</URL>
        <Description>CVE-2015-4491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942801</URL>
        <Description>SUSE Bug 942801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/948790</URL>
        <Description>SUSE Bug 948790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.</Note>
    </Notes>
    <CVE>CVE-2015-7552</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7552.html</URL>
        <Description>CVE-2015-7552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958963</URL>
        <Description>SUSE Bug 958963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.</Note>
    </Notes>
    <CVE>CVE-2015-7673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7673.html</URL>
        <Description>CVE-2015-7673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/948790</URL>
        <Description>SUSE Bug 948790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2015-7674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7674.html</URL>
        <Description>CVE-2015-7674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/948791</URL>
        <Description>SUSE Bug 948791</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.</Note>
    </Notes>
    <CVE>CVE-2016-6352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-devel-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-lang-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gdk-pixbuf-query-loaders-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6352.html</URL>
        <Description>CVE-2016-6352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027024</URL>
        <Description>SUSE Bug 1027024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991450</URL>
        <Description>SUSE Bug 991450</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
