<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qpdf</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0469-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-02-19T09:09:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-02-19T09:09:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-02-19T09:09:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qpdf</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
  
This version update for qpdf to 7.1.1 fixes the following issues:

- Update to version 7.1.1

  * Fix one linearization bug affecting files whose first /ID component is not 16 bytes long

- Update to version 7.1.0

  * Allow raw encryption key to be specified in libary and command
    line with the QPDF::setPasswordIsHexKey method and
    --password-is-hex-key option. Allow encryption key to be displayed
    with --show-encryption-key option. See 
    https://blog.didierstevens.com/2017/12/28/cracking-encrypted-pdfs-part-3/
    for a discussion of using this for cracking encrypted PDFs. I hope
    that a future release of qpdf will include some additional
    recovery options that may also make use of this capability.
  * Fix lexical error: the PDF specification allows floating point
    numbers to end with '.'
  * Fix link order in the build to avoid conflicts when building
    from source while an older version of qpdf is installed
  * Add support for TIFF predictor for LZW and Flate streams. Now
  * Clarify documentation around options that control parsing but
    not output creation. Two options: --suppress-recovery and
    --ignore-xref-streams, were documented in the 'Advanced
    Transformation Options' section of the manual and --help output
    even though they are not related to output. These are now
    described in a separate section called 'Advanced Parsing Options.'
  * Implement remaining PNG filters for decode. Prior versions could
    decode only the 'up' filter. Now all PNG filters (sub, up,
    average, Paeth, optimal) are supported for decoding.
    The implementation of the remaining PNG filters changed the
    interface to the private Pl_PNGFilter class, but this class's
    header file is not in the installation, and there is no public
    interface to the class. Within the library, the class is never
    allocated on the stack; it is only ever dynamically allocated. As
    such, this does not actually break binary compatibility of the
    library.  all predictor functions are supported

- Update to version 7.0.0

  * License is now Apache-2.0
  * Add new libjpeg8-devel dependency
  * Improve the error message that is issued when QPDFWriter encounters
    a stream that can't be decoded. In particular, mention that the stream
    will be copied without filtering to avoid data loss.
  * Add new methods to the C API to correspond to new additions to QPDFWriter:

	- qpdf_set_compress_streams
	- qpdf_set_decode_level
	- qpdf_set_preserve_unreferenced_objects
	- qpdf_set_newline_before_endstream
  * Add support for writing PCLm files
  * QPDF now supports reading and writing streams encoded with
    JPEG or RunLength encoding. Library API enhancements and
    command-line options have been added to control this
    behavior. See command-line options --compress-streams
    and --decode-level and methods QPDFWriter::setCompressStreams
    and QPDFWriter::setDecodeLevel.
  * Page rotation is now supported and accessible from both the
    library and the command line.
  * Fixes CVE-2017-12595 boo#1055960, CVE-2017-9208 boo#1040311
    CVE-2017-9209 boo#1040312, CVE-2017-9210 boo#1040313,
    CVE-2017-11627 boo#1050577, CVE-2017-11626 boo#1050578,
    CVE-2017-11625 boo#1050579, CVE-2017-11624 boo#1050581

- Update to version 6.0.0

  * Bump shared library version since 5.2.0 broke ABI.

- Update to version 5.2.0

  * Support for deterministic /IDs for non-encrypted files. This is off by default.
  * Handle more invalid xref tables
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0469-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cups-filters-1.8.2-4.2.1">
      <FullProductName ProductID="cups-filters-1.8.2-4.2.1">cups-filters-1.8.2-4.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-filters-cups-browsed-1.8.2-4.2.1">
      <FullProductName ProductID="cups-filters-cups-browsed-1.8.2-4.2.1">cups-filters-cups-browsed-1.8.2-4.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-filters-devel-1.8.2-4.2.1">
      <FullProductName ProductID="cups-filters-devel-1.8.2-4.2.1">cups-filters-devel-1.8.2-4.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-filters-foomatic-rip-1.8.2-4.2.1">
      <FullProductName ProductID="cups-filters-foomatic-rip-1.8.2-4.2.1">cups-filters-foomatic-rip-1.8.2-4.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-filters-ghostscript-1.8.2-4.2.1">
      <FullProductName ProductID="cups-filters-ghostscript-1.8.2-4.2.1">cups-filters-ghostscript-1.8.2-4.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqpdf18-7.1.1-6.3.1">
      <FullProductName ProductID="libqpdf18-7.1.1-6.3.1">libqpdf18-7.1.1-6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qpdf-7.1.1-6.3.1">
      <FullProductName ProductID="qpdf-7.1.1-6.3.1">qpdf-7.1.1-6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qpdf-devel-7.1.1-6.3.1">
      <FullProductName ProductID="qpdf-devel-7.1.1-6.3.1">qpdf-devel-7.1.1-6.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="cups-filters-1.8.2-4.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1">cups-filters-1.8.2-4.2.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-filters-cups-browsed-1.8.2-4.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1">cups-filters-cups-browsed-1.8.2-4.2.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-filters-devel-1.8.2-4.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1">cups-filters-devel-1.8.2-4.2.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-filters-foomatic-rip-1.8.2-4.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1">cups-filters-foomatic-rip-1.8.2-4.2.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-filters-ghostscript-1.8.2-4.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1">cups-filters-ghostscript-1.8.2-4.2.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqpdf18-7.1.1-6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1">libqpdf18-7.1.1-6.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qpdf-7.1.1-6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qpdf-7.1.1-6.3.1">qpdf-7.1.1-6.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qpdf-devel-7.1.1-6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1">qpdf-devel-7.1.1-6.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after two consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."</Note>
    </Notes>
    <CVE>CVE-2017-11624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11624.html</URL>
        <Description>CVE-2017-11624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050581</URL>
        <Description>SUSE Bug 1050581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDF::resolveObjectsInStream function in QPDF.cc, aka an "infinite loop."</Note>
    </Notes>
    <CVE>CVE-2017-11625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11625.html</URL>
        <Description>CVE-2017-11625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050579</URL>
        <Description>SUSE Bug 1050579</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after four consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."</Note>
    </Notes>
    <CVE>CVE-2017-11626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11626.html</URL>
        <Description>CVE-2017-11626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050578</URL>
        <Description>SUSE Bug 1050578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the PointerHolder function in PointerHolder.hh, aka an "infinite loop."</Note>
    </Notes>
    <CVE>CVE-2017-11627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11627.html</URL>
        <Description>CVE-2017-11627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050577</URL>
        <Description>SUSE Bug 1050577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::parseInternal in libqpdf/QPDFObjectHandle.cc.</Note>
    </Notes>
    <CVE>CVE-2017-12595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12595.html</URL>
        <Description>CVE-2017-12595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055960</URL>
        <Description>SUSE Bug 1055960</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to releaseResolved functions, aka qpdf-infiniteloop1.</Note>
    </Notes>
    <CVE>CVE-2017-9208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9208.html</URL>
        <Description>CVE-2017-9208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040311</URL>
        <Description>SUSE Bug 1040311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to QPDFObjectHandle::parseInternal, aka qpdf-infiniteloop2.</Note>
    </Notes>
    <CVE>CVE-2017-9209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9209.html</URL>
        <Description>CVE-2017-9209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040312</URL>
        <Description>SUSE Bug 1040312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to unparse functions, aka qpdf-infiniteloop3.</Note>
    </Notes>
    <CVE>CVE-2017-9210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:cups-filters-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-cups-browsed-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-devel-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-foomatic-rip-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:cups-filters-ghostscript-1.8.2-4.2.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libqpdf18-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-7.1.1-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qpdf-devel-7.1.1-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9210.html</URL>
        <Description>CVE-2017-9210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040313</URL>
        <Description>SUSE Bug 1040313</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
