<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpoppler-cpp0-21.08.0-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11181-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpoppler-cpp0-21.08.0-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpoppler-cpp0-21.08.0-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11181</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-0301/</URL>
      <Description>SUSE CVE CVE-2006-0301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0104/</URL>
      <Description>SUSE CVE CVE-2007-0104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4352/</URL>
      <Description>SUSE CVE CVE-2007-4352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5392/</URL>
      <Description>SUSE CVE CVE-2007-5392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5393/</URL>
      <Description>SUSE CVE CVE-2007-5393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-2950/</URL>
      <Description>SUSE CVE CVE-2008-2950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14517/</URL>
      <Description>SUSE CVE CVE-2017-14517 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14518/</URL>
      <Description>SUSE CVE CVE-2017-14518 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7515/</URL>
      <Description>SUSE CVE CVE-2017-7515 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-cpp0-21.08.0-1.3">
      <FullProductName ProductID="libpoppler-cpp0-21.08.0-1.3">libpoppler-cpp0-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-cpp0-32bit-21.08.0-1.3">
      <FullProductName ProductID="libpoppler-cpp0-32bit-21.08.0-1.3">libpoppler-cpp0-32bit-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-devel-21.08.0-1.3">
      <FullProductName ProductID="libpoppler-devel-21.08.0-1.3">libpoppler-devel-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-glib-devel-21.08.0-1.3">
      <FullProductName ProductID="libpoppler-glib-devel-21.08.0-1.3">libpoppler-glib-devel-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-glib8-21.08.0-1.3">
      <FullProductName ProductID="libpoppler-glib8-21.08.0-1.3">libpoppler-glib8-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler-glib8-32bit-21.08.0-1.3">
      <FullProductName ProductID="libpoppler-glib8-32bit-21.08.0-1.3">libpoppler-glib8-32bit-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler112-21.08.0-1.3">
      <FullProductName ProductID="libpoppler112-21.08.0-1.3">libpoppler112-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpoppler112-32bit-21.08.0-1.3">
      <FullProductName ProductID="libpoppler112-32bit-21.08.0-1.3">libpoppler112-32bit-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="poppler-tools-21.08.0-1.3">
      <FullProductName ProductID="poppler-tools-21.08.0-1.3">poppler-tools-21.08.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Poppler-0_18-21.08.0-1.3">
      <FullProductName ProductID="typelib-1_0-Poppler-0_18-21.08.0-1.3">typelib-1_0-Poppler-0_18-21.08.0-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="libpoppler-cpp0-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3">libpoppler-cpp0-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-cpp0-32bit-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3">libpoppler-cpp0-32bit-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-devel-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3">libpoppler-devel-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-glib-devel-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3">libpoppler-glib-devel-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-glib8-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3">libpoppler-glib8-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler-glib8-32bit-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3">libpoppler-glib8-32bit-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler112-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler112-21.08.0-1.3">libpoppler112-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpoppler112-32bit-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3">libpoppler112-32bit-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="poppler-tools-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:poppler-tools-21.08.0-1.3">poppler-tools-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Poppler-0_18-21.08.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3">typelib-1_0-Poppler-0_18-21.08.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.</Note>
    </Notes>
    <CVE>CVE-2006-0301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-0301.html</URL>
        <Description>CVE-2006-0301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/141242</URL>
        <Description>SUSE Bug 141242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/233113</URL>
        <Description>SUSE Bug 233113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/243010</URL>
        <Description>SUSE Bug 243010</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.</Note>
    </Notes>
    <CVE>CVE-2007-0104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0104.html</URL>
        <Description>CVE-2007-0104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/233113</URL>
        <Description>SUSE Bug 233113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/234492</URL>
        <Description>SUSE Bug 234492</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2007-4352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4352.html</URL>
        <Description>CVE-2007-4352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335637</URL>
        <Description>SUSE Bug 335637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2007-5392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5392.html</URL>
        <Description>CVE-2007-5392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335637</URL>
        <Description>SUSE Bug 335637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.</Note>
    </Notes>
    <CVE>CVE-2007-5393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5393.html</URL>
        <Description>CVE-2007-5393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/335637</URL>
        <Description>SUSE Bug 335637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Page destructor in Page.cc in libpoppler in Poppler 0.8.4 and earlier deletes a pageWidgets object even if it is not initialized by a Page constructor, which allows remote attackers to execute arbitrary code via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2008-2950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-2950.html</URL>
        <Description>CVE-2008-2950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/404955</URL>
        <Description>SUSE Bug 404955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Poppler 0.59.0, a NULL Pointer Dereference exists in the XRef::parseEntry() function in XRef.cc via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2017-14517</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14517.html</URL>
        <Description>CVE-2017-14517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059066</URL>
        <Description>SUSE Bug 1059066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2017-14518</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14518.html</URL>
        <Description>CVE-2017-14518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059101</URL>
        <Description>SUSE Bug 1059101</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">poppler through version 0.55.0 is vulnerable to an uncontrolled recursion in pdfunite resulting into potential denial-of-service.</Note>
    </Notes>
    <CVE>CVE-2017-7515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-cpp0-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib-devel-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler-glib8-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpoppler112-32bit-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:poppler-tools-21.08.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-21.08.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7515.html</URL>
        <Description>CVE-2017-7515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043088</URL>
        <Description>SUSE Bug 1043088</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
