<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">cups-2.3.3op2-4.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10707-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">cups-2.3.3op2-4.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the cups-2.3.3op2-4.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10707</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3193/</URL>
      <Description>SUSE CVE CVE-2005-3193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3624/</URL>
      <Description>SUSE CVE CVE-2005-3624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3628/</URL>
      <Description>SUSE CVE CVE-2005-3628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0104/</URL>
      <Description>SUSE CVE CVE-2007-0104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-3387/</URL>
      <Description>SUSE CVE CVE-2007-3387 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4351/</URL>
      <Description>SUSE CVE CVE-2007-4351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4352/</URL>
      <Description>SUSE CVE CVE-2007-4352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5393/</URL>
      <Description>SUSE CVE CVE-2007-5393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0047/</URL>
      <Description>SUSE CVE CVE-2008-0047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1693/</URL>
      <Description>SUSE CVE CVE-2008-1693 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1722/</URL>
      <Description>SUSE CVE CVE-2008-1722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-3641/</URL>
      <Description>SUSE CVE CVE-2008-3641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18248/</URL>
      <Description>SUSE CVE CVE-2017-18248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4700/</URL>
      <Description>SUSE CVE CVE-2018-4700 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2228/</URL>
      <Description>SUSE CVE CVE-2019-2228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8696/</URL>
      <Description>SUSE CVE CVE-2019-8696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8842/</URL>
      <Description>SUSE CVE CVE-2019-8842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10001/</URL>
      <Description>SUSE CVE CVE-2020-10001 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3898/</URL>
      <Description>SUSE CVE CVE-2020-3898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-25317/</URL>
      <Description>SUSE CVE CVE-2021-25317 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cups-2.3.3op2-4.2">
      <FullProductName ProductID="cups-2.3.3op2-4.2">cups-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-client-2.3.3op2-4.2">
      <FullProductName ProductID="cups-client-2.3.3op2-4.2">cups-client-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-config-2.3.3op2-4.2">
      <FullProductName ProductID="cups-config-2.3.3op2-4.2">cups-config-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-ddk-2.3.3op2-4.2">
      <FullProductName ProductID="cups-ddk-2.3.3op2-4.2">cups-ddk-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-devel-2.3.3op2-4.2">
      <FullProductName ProductID="cups-devel-2.3.3op2-4.2">cups-devel-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-devel-32bit-2.3.3op2-4.2">
      <FullProductName ProductID="cups-devel-32bit-2.3.3op2-4.2">cups-devel-32bit-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcups2-2.3.3op2-4.2">
      <FullProductName ProductID="libcups2-2.3.3op2-4.2">libcups2-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcups2-32bit-2.3.3op2-4.2">
      <FullProductName ProductID="libcups2-32bit-2.3.3op2-4.2">libcups2-32bit-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcupsimage2-2.3.3op2-4.2">
      <FullProductName ProductID="libcupsimage2-2.3.3op2-4.2">libcupsimage2-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcupsimage2-32bit-2.3.3op2-4.2">
      <FullProductName ProductID="libcupsimage2-32bit-2.3.3op2-4.2">libcupsimage2-32bit-2.3.3op2-4.2</FullProductName>
    </Branch>
    <Relationship ProductReference="cups-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-2.3.3op2-4.2">cups-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-client-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-client-2.3.3op2-4.2">cups-client-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-config-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-config-2.3.3op2-4.2">cups-config-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-ddk-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2">cups-ddk-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-devel-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2">cups-devel-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-devel-32bit-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2">cups-devel-32bit-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcups2-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcups2-2.3.3op2-4.2">libcups2-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcups2-32bit-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2">libcups2-32bit-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcupsimage2-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2">libcupsimage2-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcupsimage2-32bit-2.3.3op2-4.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2">libcupsimage2-32bit-2.3.3op2-4.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.</Note>
    </Notes>
    <CVE>CVE-2005-3193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3193.html</URL>
        <Description>CVE-2005-3193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/137156</URL>
        <Description>SUSE Bug 137156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/142106</URL>
        <Description>SUSE Bug 142106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.</Note>
    </Notes>
    <CVE>CVE-2005-3624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3624.html</URL>
        <Description>CVE-2005-3624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/137156</URL>
        <Description>SUSE Bug 137156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/142106</URL>
        <Description>SUSE Bug 142106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/291690</URL>
        <Description>SUSE Bug 291690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.</Note>
    </Notes>
    <CVE>CVE-2005-3628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3628.html</URL>
        <Description>CVE-2005-3628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/137156</URL>
        <Description>SUSE Bug 137156</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.</Note>
    </Notes>
    <CVE>CVE-2007-0104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0104.html</URL>
        <Description>CVE-2007-0104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/233113</URL>
        <Description>SUSE Bug 233113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/234492</URL>
        <Description>SUSE Bug 234492</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.</Note>
    </Notes>
    <CVE>CVE-2007-3387</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-3387.html</URL>
        <Description>CVE-2007-3387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/291690</URL>
        <Description>SUSE Bug 291690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335637</URL>
        <Description>SUSE Bug 335637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2007-4351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4351.html</URL>
        <Description>CVE-2007-4351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335635</URL>
        <Description>SUSE Bug 335635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2007-4352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4352.html</URL>
        <Description>CVE-2007-4352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335637</URL>
        <Description>SUSE Bug 335637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.</Note>
    </Notes>
    <CVE>CVE-2007-5393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5393.html</URL>
        <Description>CVE-2007-5393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335637</URL>
        <Description>SUSE Bug 335637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.</Note>
    </Notes>
    <CVE>CVE-2008-0047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0047.html</URL>
        <Description>CVE-2008-0047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/367225</URL>
        <Description>SUSE Bug 367225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.</Note>
    </Notes>
    <CVE>CVE-2008-1693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1693.html</URL>
        <Description>CVE-2008-1693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/377838</URL>
        <Description>SUSE Bug 377838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/377872</URL>
        <Description>SUSE Bug 377872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.</Note>
    </Notes>
    <CVE>CVE-2008-1722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1722.html</URL>
        <Description>CVE-2008-1722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/378335</URL>
        <Description>SUSE Bug 378335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/448631</URL>
        <Description>SUSE Bug 448631</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.</Note>
    </Notes>
    <CVE>CVE-2008-3641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-3641.html</URL>
        <Description>CVE-2008-3641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/430543</URL>
        <Description>SUSE Bug 430543</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.</Note>
    </Notes>
    <CVE>CVE-2017-18248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18248.html</URL>
        <Description>CVE-2017-18248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087018</URL>
        <Description>SUSE Bug 1087018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087072</URL>
        <Description>SUSE Bug 1087072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-4300. Reason: This candidate is a duplicate of CVE-2018-4300. Notes: All CVE users should reference CVE-2018-4300 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2018-4700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4700.html</URL>
        <Description>CVE-2018-4700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115750</URL>
        <Description>SUSE Bug 1115750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131480</URL>
        <Description>SUSE Bug 1131480</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196</Note>
    </Notes>
    <CVE>CVE-2019-2228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2228.html</URL>
        <Description>CVE-2019-2228</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2019-8696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8696.html</URL>
        <Description>CVE-2019-8696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146358</URL>
        <Description>SUSE Bug 1146358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146359</URL>
        <Description>SUSE Bug 1146359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.</Note>
    </Notes>
    <CVE>CVE-2019-8842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8842.html</URL>
        <Description>CVE-2019-8842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170671</URL>
        <Description>SUSE Bug 1170671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to read restricted memory.</Note>
    </Notes>
    <CVE>CVE-2020-10001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10001.html</URL>
        <Description>CVE-2020-10001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170671</URL>
        <Description>SUSE Bug 1170671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180520</URL>
        <Description>SUSE Bug 1180520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.</Note>
    </Notes>
    <CVE>CVE-2020-3898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3898.html</URL>
        <Description>CVE-2020-3898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168422</URL>
        <Description>SUSE Bug 1168422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170671</URL>
        <Description>SUSE Bug 1170671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.</Note>
    </Notes>
    <CVE>CVE-2021-25317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cups-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-client-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-config-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-25317.html</URL>
        <Description>CVE-2021-25317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184161</URL>
        <Description>SUSE Bug 1184161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192358</URL>
        <Description>SUSE Bug 1192358</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
