<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ghostscript-9.54.0-2.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10783-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ghostscript-9.54.0-2.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ghostscript-9.54.0-2.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10783</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10217/</URL>
      <Description>SUSE CVE CVE-2016-10217 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10218/</URL>
      <Description>SUSE CVE CVE-2016-10218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10219/</URL>
      <Description>SUSE CVE CVE-2016-10219 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10220/</URL>
      <Description>SUSE CVE CVE-2016-10220 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10317/</URL>
      <Description>SUSE CVE CVE-2016-10317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5951/</URL>
      <Description>SUSE CVE CVE-2017-5951 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7207/</URL>
      <Description>SUSE CVE CVE-2017-7207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8291/</URL>
      <Description>SUSE CVE CVE-2017-8291 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9216/</URL>
      <Description>SUSE CVE CVE-2017-9216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10194/</URL>
      <Description>SUSE CVE CVE-2018-10194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15908/</URL>
      <Description>SUSE CVE CVE-2018-15908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15909/</URL>
      <Description>SUSE CVE CVE-2018-15909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15910/</URL>
      <Description>SUSE CVE CVE-2018-15910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15911/</URL>
      <Description>SUSE CVE CVE-2018-15911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16509/</URL>
      <Description>SUSE CVE CVE-2018-16509 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16510/</URL>
      <Description>SUSE CVE CVE-2018-16510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16511/</URL>
      <Description>SUSE CVE CVE-2018-16511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16513/</URL>
      <Description>SUSE CVE CVE-2018-16513 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16539/</URL>
      <Description>SUSE CVE CVE-2018-16539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16540/</URL>
      <Description>SUSE CVE CVE-2018-16540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16541/</URL>
      <Description>SUSE CVE CVE-2018-16541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16542/</URL>
      <Description>SUSE CVE CVE-2018-16542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16543/</URL>
      <Description>SUSE CVE CVE-2018-16543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16585/</URL>
      <Description>SUSE CVE CVE-2018-16585 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16802/</URL>
      <Description>SUSE CVE CVE-2018-16802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17183/</URL>
      <Description>SUSE CVE CVE-2018-17183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17961/</URL>
      <Description>SUSE CVE CVE-2018-17961 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18073/</URL>
      <Description>SUSE CVE CVE-2018-18073 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18284/</URL>
      <Description>SUSE CVE CVE-2018-18284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19409/</URL>
      <Description>SUSE CVE CVE-2018-19409 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19475/</URL>
      <Description>SUSE CVE CVE-2018-19475 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19476/</URL>
      <Description>SUSE CVE CVE-2018-19476 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19477/</URL>
      <Description>SUSE CVE CVE-2018-19477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6616/</URL>
      <Description>SUSE CVE CVE-2018-6616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10216/</URL>
      <Description>SUSE CVE CVE-2019-10216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12973/</URL>
      <Description>SUSE CVE CVE-2019-12973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14811/</URL>
      <Description>SUSE CVE CVE-2019-14811 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14817/</URL>
      <Description>SUSE CVE CVE-2019-14817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3835/</URL>
      <Description>SUSE CVE CVE-2019-3835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3838/</URL>
      <Description>SUSE CVE CVE-2019-3838 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6116/</URL>
      <Description>SUSE CVE CVE-2019-6116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12268/</URL>
      <Description>SUSE CVE CVE-2020-12268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15900/</URL>
      <Description>SUSE CVE CVE-2020-15900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3781/</URL>
      <Description>SUSE CVE CVE-2021-3781 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-9.54.0-2.2">
      <FullProductName ProductID="ghostscript-9.54.0-2.2">ghostscript-9.54.0-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-devel-9.54.0-2.2">
      <FullProductName ProductID="ghostscript-devel-9.54.0-2.2">ghostscript-devel-9.54.0-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-x11-9.54.0-2.2">
      <FullProductName ProductID="ghostscript-x11-9.54.0-2.2">ghostscript-x11-9.54.0-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ghostscript-9.54.0-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ghostscript-9.54.0-2.2">ghostscript-9.54.0-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-devel-9.54.0-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2">ghostscript-devel-9.54.0-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-x11-9.54.0-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2">ghostscript-x11-9.54.0-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pdf14_open function in base/gdevp14.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module.</Note>
    </Notes>
    <CVE>CVE-2016-10217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10217.html</URL>
        <Description>CVE-2016-10217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032130</URL>
        <Description>SUSE Bug 1032130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-10218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10218.html</URL>
        <Description>CVE-2016-10218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032135</URL>
        <Description>SUSE Bug 1032135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-10219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10219.html</URL>
        <Description>CVE-2016-10219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032138</URL>
        <Description>SUSE Bug 1032138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.</Note>
    </Notes>
    <CVE>CVE-2016-10220</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10220.html</URL>
        <Description>CVE-2016-10220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032120</URL>
        <Description>SUSE Bug 1032120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036453</URL>
        <Description>SUSE Bug 1036453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.</Note>
    </Notes>
    <CVE>CVE-2016-10317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10317.html</URL>
        <Description>CVE-2016-10317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032230</URL>
        <Description>SUSE Bug 1032230</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-5951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5951.html</URL>
        <Description>CVE-2017-5951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032114</URL>
        <Description>SUSE Bug 1032114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036453</URL>
        <Description>SUSE Bug 1036453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.</Note>
    </Notes>
    <CVE>CVE-2017-7207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7207.html</URL>
        <Description>CVE-2017-7207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030263</URL>
        <Description>SUSE Bug 1030263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036453</URL>
        <Description>SUSE Bug 1036453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.</Note>
    </Notes>
    <CVE>CVE-2017-8291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8291.html</URL>
        <Description>CVE-2017-8291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036453</URL>
        <Description>SUSE Bug 1036453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.</Note>
    </Notes>
    <CVE>CVE-2017-9216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9216.html</URL>
        <Description>CVE-2017-9216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040643</URL>
        <Description>SUSE Bug 1040643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2018-10194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10194.html</URL>
        <Description>CVE-2018-10194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090099</URL>
        <Description>SUSE Bug 1090099</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.</Note>
    </Notes>
    <CVE>CVE-2018-15908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15908.html</URL>
        <Description>CVE-2018-15908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106171</URL>
        <Description>SUSE Bug 1106171</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.</Note>
    </Notes>
    <CVE>CVE-2018-15909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15909.html</URL>
        <Description>CVE-2018-15909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106172</URL>
        <Description>SUSE Bug 1106172</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.</Note>
    </Notes>
    <CVE>CVE-2018-15910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15910.html</URL>
        <Description>CVE-2018-15910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106173</URL>
        <Description>SUSE Bug 1106173</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.</Note>
    </Notes>
    <CVE>CVE-2018-15911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15911.html</URL>
        <Description>CVE-2018-15911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106195</URL>
        <Description>SUSE Bug 1106195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.</Note>
    </Notes>
    <CVE>CVE-2018-16509</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16509.html</URL>
        <Description>CVE-2018-16509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107410</URL>
        <Description>SUSE Bug 1107410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118318</URL>
        <Description>SUSE Bug 1118318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16510.html</URL>
        <Description>CVE-2018-16510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107411</URL>
        <Description>SUSE Bug 1107411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16511.html</URL>
        <Description>CVE-2018-16511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107426</URL>
        <Description>SUSE Bug 1107426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16513.html</URL>
        <Description>CVE-2018-16513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107412</URL>
        <Description>SUSE Bug 1107412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.</Note>
    </Notes>
    <CVE>CVE-2018-16539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16539.html</URL>
        <Description>CVE-2018-16539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107422</URL>
        <Description>SUSE Bug 1107422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16540.html</URL>
        <Description>CVE-2018-16540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107420</URL>
        <Description>SUSE Bug 1107420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.</Note>
    </Notes>
    <CVE>CVE-2018-16541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16541.html</URL>
        <Description>CVE-2018-16541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107421</URL>
        <Description>SUSE Bug 1107421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.</Note>
    </Notes>
    <CVE>CVE-2018-16542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16542.html</URL>
        <Description>CVE-2018-16542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107413</URL>
        <Description>SUSE Bug 1107413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.</Note>
    </Notes>
    <CVE>CVE-2018-16543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16543.html</URL>
        <Description>CVE-2018-16543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107423</URL>
        <Description>SUSE Bug 1107423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193).</Note>
    </Notes>
    <CVE>CVE-2018-16585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16585.html</URL>
        <Description>CVE-2018-16585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107581</URL>
        <Description>SUSE Bug 1107581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.</Note>
    </Notes>
    <CVE>CVE-2018-16802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16802.html</URL>
        <Description>CVE-2018-16802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107410</URL>
        <Description>SUSE Bug 1107410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117327</URL>
        <Description>SUSE Bug 1117327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.</Note>
    </Notes>
    <CVE>CVE-2018-17183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17183.html</URL>
        <Description>CVE-2018-17183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.</Note>
    </Notes>
    <CVE>CVE-2018-17961</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17961.html</URL>
        <Description>CVE-2018-17961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129180</URL>
        <Description>SUSE Bug 1129180</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.</Note>
    </Notes>
    <CVE>CVE-2018-18073</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18073.html</URL>
        <Description>CVE-2018-18073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.</Note>
    </Notes>
    <CVE>CVE-2018-18284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18284.html</URL>
        <Description>CVE-2018-18284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144621</URL>
        <Description>SUSE Bug 1144621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.</Note>
    </Notes>
    <CVE>CVE-2018-19409</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19409.html</URL>
        <Description>CVE-2018-19409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.</Note>
    </Notes>
    <CVE>CVE-2018-19475</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19475.html</URL>
        <Description>CVE-2018-19475</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117327</URL>
        <Description>SUSE Bug 1117327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.</Note>
    </Notes>
    <CVE>CVE-2018-19476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19476.html</URL>
        <Description>CVE-2018-19476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117313</URL>
        <Description>SUSE Bug 1117313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.</Note>
    </Notes>
    <CVE>CVE-2018-19477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19477.html</URL>
        <Description>CVE-2018-19477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117274</URL>
        <Description>SUSE Bug 1117274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.</Note>
    </Notes>
    <CVE>CVE-2018-6616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6616.html</URL>
        <Description>CVE-2018-6616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079845</URL>
        <Description>SUSE Bug 1079845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140359</URL>
        <Description>SUSE Bug 1140359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.</Note>
    </Notes>
    <CVE>CVE-2019-10216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10216.html</URL>
        <Description>CVE-2019-10216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144621</URL>
        <Description>SUSE Bug 1144621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146882</URL>
        <Description>SUSE Bug 1146882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146884</URL>
        <Description>SUSE Bug 1146884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.</Note>
    </Notes>
    <CVE>CVE-2019-12973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12973.html</URL>
        <Description>CVE-2019-12973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140359</URL>
        <Description>SUSE Bug 1140359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.</Note>
    </Notes>
    <CVE>CVE-2019-14811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14811.html</URL>
        <Description>CVE-2019-14811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146882</URL>
        <Description>SUSE Bug 1146882</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.</Note>
    </Notes>
    <CVE>CVE-2019-14817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14817.html</URL>
        <Description>CVE-2019-14817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146882</URL>
        <Description>SUSE Bug 1146882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146884</URL>
        <Description>SUSE Bug 1146884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.</Note>
    </Notes>
    <CVE>CVE-2019-3835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3835.html</URL>
        <Description>CVE-2019-3835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129180</URL>
        <Description>SUSE Bug 1129180</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.</Note>
    </Notes>
    <CVE>CVE-2019-3838</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3838.html</URL>
        <Description>CVE-2019-3838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018128</URL>
        <Description>SUSE Bug 1018128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030263</URL>
        <Description>SUSE Bug 1030263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032135</URL>
        <Description>SUSE Bug 1032135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038835</URL>
        <Description>SUSE Bug 1038835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050888</URL>
        <Description>SUSE Bug 1050888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050889</URL>
        <Description>SUSE Bug 1050889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106171</URL>
        <Description>SUSE Bug 1106171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106172</URL>
        <Description>SUSE Bug 1106172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106173</URL>
        <Description>SUSE Bug 1106173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107422</URL>
        <Description>SUSE Bug 1107422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107423</URL>
        <Description>SUSE Bug 1107423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107581</URL>
        <Description>SUSE Bug 1107581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114495</URL>
        <Description>SUSE Bug 1114495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117327</URL>
        <Description>SUSE Bug 1117327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118318</URL>
        <Description>SUSE Bug 1118318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129180</URL>
        <Description>SUSE Bug 1129180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129186</URL>
        <Description>SUSE Bug 1129186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136756</URL>
        <Description>SUSE Bug 1136756</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6116.html</URL>
        <Description>CVE-2019-6116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122319</URL>
        <Description>SUSE Bug 1122319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129186</URL>
        <Description>SUSE Bug 1129186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134156</URL>
        <Description>SUSE Bug 1134156</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2020-12268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12268.html</URL>
        <Description>CVE-2020-12268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170603</URL>
        <Description>SUSE Bug 1170603</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.</Note>
    </Notes>
    <CVE>CVE-2020-15900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15900.html</URL>
        <Description>CVE-2020-15900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174415</URL>
        <Description>SUSE Bug 1174415</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ghostscript-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3781.html</URL>
        <Description>CVE-2021-3781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190381</URL>
        <Description>SUSE Bug 1190381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191712</URL>
        <Description>SUSE Bug 1191712</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
