Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-1179 (GCVE-0-2009-1179)
Vulnerability from cvelistv5 – Published: 2009-04-23 17:00 – Updated: 2024-08-07 05:04- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:04:49.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-1793",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"name": "34963",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34963"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "DSA-1790",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"name": "35037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35037"
},
{
"name": "ADV-2009-1077",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"name": "ADV-2009-1621",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "35064",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35064"
},
{
"name": "ADV-2009-1066",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"name": "34481",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34481"
},
{
"name": "SSA:2009-129-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"name": "APPLE-SA-2009-06-08-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"name": "RHSA-2009:0431",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"name": "ADV-2009-1065",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"name": "RHSA-2009:0430",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"name": "ADV-2009-1522",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"name": "FEDORA-2009-6972",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"name": "35618",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35618"
},
{
"name": "APPLE-SA-2009-06-17-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "35065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35065"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
},
{
"name": "RHSA-2009:0480",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"name": "34568",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34568"
},
{
"name": "MDVSA-2011:175",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"name": "VU#196617",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"name": "ADV-2010-1040",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/1040"
},
{
"name": "SUSE-SA:2009:024",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"name": "RHSA-2009:0458",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"name": "FEDORA-2009-6982",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
},
{
"name": "34991",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34991"
},
{
"name": "35379",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35379"
},
{
"name": "MDVSA-2009:101",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"name": "MDVSA-2010:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"name": "SUSE-SR:2009:010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"name": "35685",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35685"
},
{
"name": "ADV-2009-1076",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"name": "34756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34756"
},
{
"name": "34291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34291"
},
{
"name": "34755",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34755"
},
{
"name": "34852",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34852"
},
{
"name": "SUSE-SR:2009:012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "FEDORA-2009-6973",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"name": "34959",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34959"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3613"
},
{
"name": "34746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34746"
},
{
"name": "RHSA-2009:0429",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"name": "1022073",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022073"
},
{
"name": "oval:org.mitre.oval:def:11892",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-04-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "DSA-1793",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"name": "34963",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34963"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "DSA-1790",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"name": "35037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35037"
},
{
"name": "ADV-2009-1077",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"name": "ADV-2009-1621",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "35064",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35064"
},
{
"name": "ADV-2009-1066",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"name": "34481",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34481"
},
{
"name": "SSA:2009-129-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"name": "APPLE-SA-2009-06-08-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"name": "RHSA-2009:0431",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"name": "ADV-2009-1065",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"name": "RHSA-2009:0430",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"name": "ADV-2009-1522",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"name": "FEDORA-2009-6972",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"name": "35618",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35618"
},
{
"name": "APPLE-SA-2009-06-17-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "35065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35065"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
},
{
"name": "RHSA-2009:0480",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"name": "34568",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34568"
},
{
"name": "MDVSA-2011:175",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"name": "VU#196617",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"name": "ADV-2010-1040",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/1040"
},
{
"name": "SUSE-SA:2009:024",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"name": "RHSA-2009:0458",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"name": "FEDORA-2009-6982",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
},
{
"name": "34991",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34991"
},
{
"name": "35379",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35379"
},
{
"name": "MDVSA-2009:101",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"name": "MDVSA-2010:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"name": "SUSE-SR:2009:010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"name": "35685",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35685"
},
{
"name": "ADV-2009-1076",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"name": "34756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34756"
},
{
"name": "34291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34291"
},
{
"name": "34755",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34755"
},
{
"name": "34852",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34852"
},
{
"name": "SUSE-SR:2009:012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "FEDORA-2009-6973",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"name": "34959",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34959"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3613"
},
{
"name": "34746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34746"
},
{
"name": "RHSA-2009:0429",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"name": "1022073",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022073"
},
{
"name": "oval:org.mitre.oval:def:11892",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-1179",
"datePublished": "2009-04-23T17:00:00.000Z",
"dateReserved": "2009-03-31T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:04:49.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2009-1179",
"date": "2026-05-24",
"epss": "0.27841",
"percentile": "0.9653"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8ABE533-8FC1-45E6-B574-A4CC7571EF7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B02805E-7BD0-4563-82C8-6FFB982D4913\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"852F526D-F388-4FF0-BDD9-DF7635DB46D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"478D53EA-CC8C-4ECB-8410-0910505AD819\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C84FB90-FF1C-4502-B2D2-390438DD422F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13341DAE-D16D-41A7-BF17-FEC802997B15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E30BAEA-231C-4A82-B014-9EE3D1E81545\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE1DE5A5-6448-43F6-A612-56998D16E6B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F84699-D4CF-4FD1-A959-53E316559EBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D820DFD5-0EF9-4C9A-B281-D553A4F63141\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2EFC7E4-E513-42DB-BDA5-8D1E497971DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AA5CDDC-BFDE-4C5E-920F-5DA1B3C51B52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CF839D-D034-4D47-977F-7E27B36EF04F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3B3E8A4-14FE-42DA-B82E-839B092B5302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.02\", \"matchCriteriaId\": \"32628280-E2DB-45E0-AB8A-CFC90419A182\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEF5EC54-9145-4B51-8241-C9343160BF80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D33C2C1D-C1C1-4B1D-BDC8-6480CE8EC24B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1344DF7-9917-4DB0-9256-9E8131C55B0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"309F0CF2-4AF7-4F46-91EA-39BA07BAF312\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36FA872B-74B8-48E4-9D5C-5ACA6FCB8026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20311EDE-0E34-432A-AE41-F61EA68F134A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16FEF460-3569-4294-ABA4-D7C251D67071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB41E8C2-BBCC-48CB-805B-23411D39E936\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16670F8A-E70B-4CDF-8C61-414D86E20C84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69483A91-53DB-4736-908F-7B14EFB40888\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B3E7962-0A95-4E7B-A983-683B02350B93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD1120B3-3372-417B-BCA0-FD515638FBFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7397645-3225-4980-8465-28F93322B58B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1672587F-ED28-4A8A-A6C1-AD1D6B5DF9F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5A45EAF-B511-4360-A201-D588E7EEB39D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D14637F7-DC99-4AC4-854C-DBA0B4C6BE54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EE03979-D564-4ABD-BEBD-E86E7C1BAF9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15D08CFD-BEE1-4DEE-926D-F4291F88224D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D244903F-5407-4C35-AE2C-1A05D3C227D4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.10.5\", \"matchCriteriaId\": \"E0299F4A-A027-430C-9A53-AFEF9022960C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E23EBF88-10DE-4EA6-9F0E-F33C88541F65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54F75CFD-3523-4017-992C-4FA6406D49F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB116A19-6436-40BE-B5C6-32C22D888B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A4C1429-593B-47B6-AC84-832F2296FAB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18240BA6-3390-4925-AC25-DA4C42397CF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3090A142-2240-4A8D-A122-C037931A277C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFD63240-4599-4212-8AF2-7C4089CA9D28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C7EE965-EE3F-4B17-AF38-FA3AA0B11164\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BE488E5-B3D9-4723-ABBA-A8753EC2DA2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1259C59E-517F-40BE-8BA6-01AB76257C9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"576152B4-9ACD-4C4E-B423-4A5EF44332D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"322F9E62-6A74-4805-8F6B-9C61739B2D4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F51C453F-6A87-49FB-83F6-22316F28161F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75F532F0-6653-4275-A85A-BD9A9A611E96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CC7300E-0CBE-47FD-A241-B4B4F0164EBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"255102DA-A2C0-4795-9539-B4CBD587554A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"349B06F1-772A-4A12-A7B9-EA220ED96D2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B779800A-FF4B-47DD-B56F-77D10D6A335C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0213390-08FA-4E04-835B-8BE0FC61B464\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B304657-740A-4F8D-99CD-22E283FEE6F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"178680C2-DB1B-4250-9B6E-6ADABA60DE44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCA9036F-92DA-45C2-9FBC-DE03444D34F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6855B98-DAA2-4850-A765-2F4D6D93A424\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4743EC55-B61D-4C1A-9ED7-060268F2DB27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CD4454E-3D2B-4582-B5E5-0317A6417654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96402B67-A7A8-44E3-914E-A10A69FAD735\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66C608C8-F382-4D6B-A638-98763C1CBB66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21F0F4E0-91B7-4B1F-BFA9-829101A7F90A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22287102-80B1-4E1F-85E4-488B020A51E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF3030D6-DE07-418B-AB40-87C85FCA3C58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3583D56-F653-457A-B1F8-25842A15CB82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EEA5DBB-5A80-439E-A135-77CB40772916\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4A5C43B-3978-4D0A-8166-A99622106781\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A940AF2-A7CA-408F-86E2-797C7BA8A6BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B2CD8A0-2DBA-4AC9-A97D-D4DAEB6C7A74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA56CB7C-E7B3-4F0B-8BEB-F133FAF0D6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6323ED7A-6FE8-4885-B743-3E2F82ECA08B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90D3345C-2D35-413C-B6F9-C308BC7C2AA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26216EEC-26B7-41C8-ADFB-64D2EA8DAA8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D3618D-A183-4B09-9CA2-8D622C3486DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A88294D9-563E-4AB3-9FE6-971F43B052B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A39F672-B238-4B21-A48E-5121771949F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58A5D199-E952-44B5-B5E5-170040FA813E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"349B4B75-32E2-49FB-9606-8B057AFA2E3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55A8D058-224E-467E-AB61-06F90B541F24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77C47EDD-2212-4259-8229-FF05E1A7B5AD\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.3.9\", \"matchCriteriaId\": \"B4E90153-8D18-4A50-9581-895C851F6489\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4D89E03-94D0-4F7F-9A54-3021E3E5A321\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298D6BE7-7683-4225-8DD6-4C0FC5EB48BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"230B77E7-B1AE-4470-859D-7B5F99749D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B6070FC-4566-4314-940E-0AAE34B56E28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC691F07-8B38-4867-AB18-51F380CAEA46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E943EFBF-39A7-408F-8AC5-677E83DFDBB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EA7725A-4398-4C76-BEBF-10E56C7F34F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7415295-0FBF-4946-8D99-8CB2EC391319\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C702EE3-4B7C-42EA-92AA-8717807CF67C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73F74581-D71C-4FEC-BA8C-85EF4C1991BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ABCFB52-33D3-428C-B1D5-DCE504170A37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45F03F2B-6AC3-4872-9032-293C2E9B837C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E02B6FB-C36D-45F3-95F3-566CA03B29A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96093309-A87D-48D0-84DA-446255ABF231\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF67F149-614B-4507-A15F-E557A1B73423\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49862F77-B8DE-4AA7-AE17-B348B05AC00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78D7719F-03E0-4E66-A50A-F8E857A9B6AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3139FDA-9476-4414-B349-7119E63FD268\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"523FE78C-441F-4ACD-B9F2-3E5293E277AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F887B5B1-7528-4086-AE6C-134F54A93342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8C5C552-6276-4791-80CD-6B3EB425EF04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8335D4E3-563D-4288-B708-A9635BCA595F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5279D055-248A-4BD1-9FBB-0024BA16DF5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"16519855-FCB9-44A8-9C7E-116192327BAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D9330B-C51A-4C7D-A322-85103C64D86C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DA0C19F-95EB-429C-AF06-A2C1D5643662\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CCE80-FF4B-4B39-B8BD-EB4710047524\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"07925DD8-50C0-4908-95D1-7342A4617BBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48A519DB-6C6D-4094-814D-33BD5EF389BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6ED7566-5092-4B08-97A9-B2B53117A224\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"98DCAC0C-896F-4353-A665-5BCD0D8AEBA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E72614CD-8F70-4E07-AD83-8FDE8026CEC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"48E62419-C165-4B42-8C23-E24821BD4BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"217D804B-CA56-49CE-B9EB-2A297EB1763C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"A41E8583-C837-4871-B4D2-FD41C78D538E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D480C37B-0DA8-4096-80B0-5198FE589A4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"74F5A83B-3C1A-49F3-A9D6-F7B9B897E447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"241D4183-879D-4974-BACB-A6987EDA2E7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96592A93-4967-4B91-BCF7-558DC472E7BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8758715D-B973-4960-8B7D-6F9A11E73288\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0370E9EB-B830-4362-B83C-912579695691\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D644926A-C2A5-45FE-85A3-2782CE87ED86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0696E675-0A13-45FC-8917-845E6FF7A311\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78BAC98C-1FE6-42A3-8B62-E3C321914F6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCC3EF2F-0140-4185-9FB3-2B595B61CDC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C36785A-F735-45C0-986B-9624AD65F0C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C1D3916-607F-44E8-9D47-93C6C0789083\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"174613C3-A04B-4701-849B-BAA598BF4F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81C1137C-BE3D-45F9-83C9-D212107F0E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CBC1F81-E93A-42A7-8BC8-4B903688F2E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FA876FF-C58A-45CF-A8E8-E2068DF79421\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FD78771-BD9A-4AC2-B664-B189DD288FB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50A16424-732F-4B76-A753-1642A97BC1EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E189C976-2DD2-485C-828E-7FC3DC6A8F32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A86CA90F-A944-4F3E-B75F-8147125335D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FAFABDC-E40F-4C53-AC66-94EFD077665D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F96C1B80-9E20-4832-8308-BF7911569EF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F2D7DB3-F467-4BC0-83BB-4706D067A2C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46C394DC-65A7-4713-B823-6F5D329A0C5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5E9F74F-3C7D-486A-8BA1-EE2A73160B39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69BD64BB-BDA7-4F82-8324-B7C7C941133C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8814509-8B08-46C6-AE50-19B7D30DCF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0718FB6B-D787-409A-B535-0318F2C63A81\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de enteros en el decodificador JBIG2 en Xpdf versi\\u00f3n 3.02 PL2 y anteriores, CUPS versi\\u00f3n 1.3.9 y anteriores, Poppler versi\\u00f3n anterior a 0.10.6, y otros productos permite a los atacantes remotos ejecutar c\\u00f3digo arbitrario por medio de un archivo PDF creado.\"}]",
"id": "CVE-2009-1179",
"lastModified": "2024-11-21T01:01:50.723",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-04-23T17:30:01.750",
"references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://poppler.freedesktop.org/releases.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2009-0458.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/34291\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34481\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34746\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34755\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34756\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34852\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34959\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34963\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34991\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35037\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35064\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35065\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35379\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35618\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35685\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.apple.com/kb/HT3613\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.apple.com/kb/HT3639\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1790\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1793\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/196617\", \"source\": \"secalert@redhat.com\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:101\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:087\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:175\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0429.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0430.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0431.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0480.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/34568\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1022073\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1065\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1066\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1076\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1077\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1522\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1621\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1040\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=495889\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://poppler.freedesktop.org/releases.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2009-0458.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34481\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34746\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34755\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34756\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34852\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34959\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34963\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/34991\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35037\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35064\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35065\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35379\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35618\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35685\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT3613\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT3639\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1790\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1793\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/196617\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:101\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:087\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:175\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0429.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0430.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0431.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-0480.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/34568\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1022073\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1065\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1066\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1076\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1077\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1522\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1621\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1040\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=495889\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-1179\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-04-23T17:30:01.750\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de enteros en el decodificador JBIG2 en Xpdf versi\u00f3n 3.02 PL2 y anteriores, CUPS versi\u00f3n 1.3.9 y anteriores, Poppler versi\u00f3n anterior a 0.10.6, y otros productos permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8ABE533-8FC1-45E6-B574-A4CC7571EF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B02805E-7BD0-4563-82C8-6FFB982D4913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"852F526D-F388-4FF0-BDD9-DF7635DB46D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"478D53EA-CC8C-4ECB-8410-0910505AD819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C84FB90-FF1C-4502-B2D2-390438DD422F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13341DAE-D16D-41A7-BF17-FEC802997B15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E30BAEA-231C-4A82-B014-9EE3D1E81545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1DE5A5-6448-43F6-A612-56998D16E6B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F84699-D4CF-4FD1-A959-53E316559EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D820DFD5-0EF9-4C9A-B281-D553A4F63141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2EFC7E4-E513-42DB-BDA5-8D1E497971DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA5CDDC-BFDE-4C5E-920F-5DA1B3C51B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CF839D-D034-4D47-977F-7E27B36EF04F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3B3E8A4-14FE-42DA-B82E-839B092B5302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.02\",\"matchCriteriaId\":\"32628280-E2DB-45E0-AB8A-CFC90419A182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF5EC54-9145-4B51-8241-C9343160BF80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33C2C1D-C1C1-4B1D-BDC8-6480CE8EC24B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1344DF7-9917-4DB0-9256-9E8131C55B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309F0CF2-4AF7-4F46-91EA-39BA07BAF312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FA872B-74B8-48E4-9D5C-5ACA6FCB8026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20311EDE-0E34-432A-AE41-F61EA68F134A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FEF460-3569-4294-ABA4-D7C251D67071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB41E8C2-BBCC-48CB-805B-23411D39E936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16670F8A-E70B-4CDF-8C61-414D86E20C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69483A91-53DB-4736-908F-7B14EFB40888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3E7962-0A95-4E7B-A983-683B02350B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1120B3-3372-417B-BCA0-FD515638FBFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7397645-3225-4980-8465-28F93322B58B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1672587F-ED28-4A8A-A6C1-AD1D6B5DF9F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A45EAF-B511-4360-A201-D588E7EEB39D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14637F7-DC99-4AC4-854C-DBA0B4C6BE54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE03979-D564-4ABD-BEBD-E86E7C1BAF9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D08CFD-BEE1-4DEE-926D-F4291F88224D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D244903F-5407-4C35-AE2C-1A05D3C227D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.10.5\",\"matchCriteriaId\":\"E0299F4A-A027-430C-9A53-AFEF9022960C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23EBF88-10DE-4EA6-9F0E-F33C88541F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F75CFD-3523-4017-992C-4FA6406D49F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB116A19-6436-40BE-B5C6-32C22D888B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4C1429-593B-47B6-AC84-832F2296FAB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18240BA6-3390-4925-AC25-DA4C42397CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3090A142-2240-4A8D-A122-C037931A277C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD63240-4599-4212-8AF2-7C4089CA9D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7EE965-EE3F-4B17-AF38-FA3AA0B11164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE488E5-B3D9-4723-ABBA-A8753EC2DA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1259C59E-517F-40BE-8BA6-01AB76257C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"576152B4-9ACD-4C4E-B423-4A5EF44332D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"322F9E62-6A74-4805-8F6B-9C61739B2D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51C453F-6A87-49FB-83F6-22316F28161F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75F532F0-6653-4275-A85A-BD9A9A611E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC7300E-0CBE-47FD-A241-B4B4F0164EBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"255102DA-A2C0-4795-9539-B4CBD587554A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"349B06F1-772A-4A12-A7B9-EA220ED96D2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B779800A-FF4B-47DD-B56F-77D10D6A335C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0213390-08FA-4E04-835B-8BE0FC61B464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B304657-740A-4F8D-99CD-22E283FEE6F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178680C2-DB1B-4250-9B6E-6ADABA60DE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA9036F-92DA-45C2-9FBC-DE03444D34F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6855B98-DAA2-4850-A765-2F4D6D93A424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4743EC55-B61D-4C1A-9ED7-060268F2DB27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CD4454E-3D2B-4582-B5E5-0317A6417654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96402B67-A7A8-44E3-914E-A10A69FAD735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66C608C8-F382-4D6B-A638-98763C1CBB66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F0F4E0-91B7-4B1F-BFA9-829101A7F90A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22287102-80B1-4E1F-85E4-488B020A51E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3030D6-DE07-418B-AB40-87C85FCA3C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3583D56-F653-457A-B1F8-25842A15CB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EEA5DBB-5A80-439E-A135-77CB40772916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A5C43B-3978-4D0A-8166-A99622106781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A940AF2-A7CA-408F-86E2-797C7BA8A6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B2CD8A0-2DBA-4AC9-A97D-D4DAEB6C7A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA56CB7C-E7B3-4F0B-8BEB-F133FAF0D6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6323ED7A-6FE8-4885-B743-3E2F82ECA08B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90D3345C-2D35-413C-B6F9-C308BC7C2AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26216EEC-26B7-41C8-ADFB-64D2EA8DAA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D3618D-A183-4B09-9CA2-8D622C3486DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A88294D9-563E-4AB3-9FE6-971F43B052B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A39F672-B238-4B21-A48E-5121771949F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A5D199-E952-44B5-B5E5-170040FA813E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"349B4B75-32E2-49FB-9606-8B057AFA2E3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A8D058-224E-467E-AB61-06F90B541F24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C47EDD-2212-4259-8229-FF05E1A7B5AD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.9\",\"matchCriteriaId\":\"B4E90153-8D18-4A50-9581-895C851F6489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D89E03-94D0-4F7F-9A54-3021E3E5A321\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298D6BE7-7683-4225-8DD6-4C0FC5EB48BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230B77E7-B1AE-4470-859D-7B5F99749D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6070FC-4566-4314-940E-0AAE34B56E28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC691F07-8B38-4867-AB18-51F380CAEA46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E943EFBF-39A7-408F-8AC5-677E83DFDBB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA7725A-4398-4C76-BEBF-10E56C7F34F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7415295-0FBF-4946-8D99-8CB2EC391319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C702EE3-4B7C-42EA-92AA-8717807CF67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F74581-D71C-4FEC-BA8C-85EF4C1991BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABCFB52-33D3-428C-B1D5-DCE504170A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45F03F2B-6AC3-4872-9032-293C2E9B837C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E02B6FB-C36D-45F3-95F3-566CA03B29A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96093309-A87D-48D0-84DA-446255ABF231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF67F149-614B-4507-A15F-E557A1B73423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49862F77-B8DE-4AA7-AE17-B348B05AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D7719F-03E0-4E66-A50A-F8E857A9B6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3139FDA-9476-4414-B349-7119E63FD268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"523FE78C-441F-4ACD-B9F2-3E5293E277AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F887B5B1-7528-4086-AE6C-134F54A93342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C5C552-6276-4791-80CD-6B3EB425EF04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8335D4E3-563D-4288-B708-A9635BCA595F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5279D055-248A-4BD1-9FBB-0024BA16DF5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"16519855-FCB9-44A8-9C7E-116192327BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9330B-C51A-4C7D-A322-85103C64D86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA0C19F-95EB-429C-AF06-A2C1D5643662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CCE80-FF4B-4B39-B8BD-EB4710047524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"07925DD8-50C0-4908-95D1-7342A4617BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A519DB-6C6D-4094-814D-33BD5EF389BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6ED7566-5092-4B08-97A9-B2B53117A224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DCAC0C-896F-4353-A665-5BCD0D8AEBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72614CD-8F70-4E07-AD83-8FDE8026CEC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E62419-C165-4B42-8C23-E24821BD4BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"217D804B-CA56-49CE-B9EB-2A297EB1763C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41E8583-C837-4871-B4D2-FD41C78D538E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D480C37B-0DA8-4096-80B0-5198FE589A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F5A83B-3C1A-49F3-A9D6-F7B9B897E447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"241D4183-879D-4974-BACB-A6987EDA2E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96592A93-4967-4B91-BCF7-558DC472E7BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8758715D-B973-4960-8B7D-6F9A11E73288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0370E9EB-B830-4362-B83C-912579695691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D644926A-C2A5-45FE-85A3-2782CE87ED86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0696E675-0A13-45FC-8917-845E6FF7A311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BAC98C-1FE6-42A3-8B62-E3C321914F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC3EF2F-0140-4185-9FB3-2B595B61CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C36785A-F735-45C0-986B-9624AD65F0C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1D3916-607F-44E8-9D47-93C6C0789083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174613C3-A04B-4701-849B-BAA598BF4F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C1137C-BE3D-45F9-83C9-D212107F0E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBC1F81-E93A-42A7-8BC8-4B903688F2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA876FF-C58A-45CF-A8E8-E2068DF79421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD78771-BD9A-4AC2-B664-B189DD288FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50A16424-732F-4B76-A753-1642A97BC1EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E189C976-2DD2-485C-828E-7FC3DC6A8F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86CA90F-A944-4F3E-B75F-8147125335D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAFABDC-E40F-4C53-AC66-94EFD077665D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96C1B80-9E20-4832-8308-BF7911569EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D7DB3-F467-4BC0-83BB-4706D067A2C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C394DC-65A7-4713-B823-6F5D329A0C5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E9F74F-3C7D-486A-8BA1-EE2A73160B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69BD64BB-BDA7-4F82-8324-B7C7C941133C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8814509-8B08-46C6-AE50-19B7D30DCF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0718FB6B-D787-409A-B535-0318F2C63A81\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://poppler.freedesktop.org/releases.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-0458.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/34291\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34481\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34746\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34755\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34756\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34852\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34959\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34963\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34991\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35037\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35064\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35065\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35618\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35685\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1790\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1793\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/196617\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:101\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:087\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:175\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0429.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0430.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0431.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0480.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/34568\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1022073\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1065\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1066\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1076\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1077\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/1040\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=495889\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://poppler.freedesktop.org/releases.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-0458.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34746\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34963\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34991\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35064\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/196617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:087\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:175\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0429.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0430.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0431.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0480.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/34568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1022073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1076\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/1040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=495889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2009-AVI-156
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans CUPS permettent à un utilisateur distant malveillant d'exécuter du code arbitraire ou de porter atteinte à la confidentialité des données.
Description
Plusieurs vulnérabilités présentes dans la commande pdftops, causées par l'usage de code source vulnérable issu de Xpdf, peuvent être exploitées afin de provoquer un déni de service ou d'exécuter du code arbitraire à distance.
Une vulnérabilité de type débordement d'entier durant le traitement d'un fichier au format TIFF peut être exploitée au moyen d'un fichier spécialement construit afin d'exécuter du code arbitraire à distance.
Une erreur dans le traitement des en-têtes Host: permet à une personne malveillante de porter atteinte à la confidentialité des données telles que l'historique des travaux d'impression.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CUPS 1.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans la commande pdftops, caus\u00e9es par\nl\u0027usage de code source vuln\u00e9rable issu de Xpdf, peuvent \u00eatre exploit\u00e9es\nafin de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier durant le traitement d\u0027un\nfichier au format TIFF peut \u00eatre exploit\u00e9e au moyen d\u0027un fichier\nsp\u00e9cialement construit afin d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\nUne erreur dans le traitement des en-t\u00eates Host: permet \u00e0 une personne\nmalveillante de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es telles\nque l\u0027historique des travaux d\u0027impression.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2009-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0799"
},
{
"name": "CVE-2009-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0166"
},
{
"name": "CVE-2009-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1182"
},
{
"name": "CVE-2009-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0195"
},
{
"name": "CVE-2009-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1180"
},
{
"name": "CVE-2009-1183",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1183"
},
{
"name": "CVE-2009-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0800"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-0163",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0163"
},
{
"name": "CVE-2009-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1181"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0429-1 du 16 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0429.html"
},
{
"title": "Notes de s\u00e9curit\u00e9 CUPS STR #3031 et #3118 du 16 avril 2009 :",
"url": "http://cups.org/str.php?L3118"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0458-1 du 30 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"title": "Notes de s\u00e9curit\u00e9 CUPS STR #3031 et #3118 du 16 avril 2009 :",
"url": "http://cups.org/str.php?L3031"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1773 du 17 avril 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1773"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200904-20 du 23 avril 2009 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-759-1 et USN-760-1 du 16 avril 2009 :",
"url": "http://www.ubuntu.com/usn/usn-759-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1790 du 05 mai 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0430-1 du 16 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0430.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0431-1 du 16 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0431.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-759-1 et USN-760-1 du 16 avril 2009 :",
"url": "http://www.ubuntu.com/usn/usn-760-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2009:024 du 22 avril 2009 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1793 du 06 mai 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1793"
}
],
"reference": "CERTA-2009-AVI-156",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-04-21T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, Debian, RedHat et SuSE.",
"revision_date": "2009-05-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans CUPS permettent \u00e0 un\nutilisateur distant malveillant d\u0027ex\u00e9cuter du code arbitraire ou de\nporter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans cups",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de changements CUPS du 16 avril 2009",
"url": "http://cups.org/articles.php?L582"
}
]
}
CERTA-2009-AVI-223
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans Apple Safari permettant, entre autre, l'exécution de code arbitraire à distance ont été corrigées.
Description
De multiples vulnérabilités dans Apple Safari ont été corrigées dont :
- Des images identifiées comme des fichiers HTML permettent l'exécution automatique de Javascript ;
- plusieurs corruptions mémoire affectant le composant CoreGraphics permettent l'exécution de code arbitraire (Microsoft Windows) à distance ;
- plusieurs vulnérabilités affectent le composant WebKit et permettent, entre autre, des attaques en XSS ou l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Les versions de Safari antérieures à 4.0 pour les systèmes d'exploitation suivants :
- Mac OS X 10.4.x ;
- Mac OS X 10.5.x ;
- Mac OS X Server 10.4.x ;
- Mac OS X Server 10.5.x ;
- Windows XP ;
- Windows Vista.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eLes versions de Safari ant\u00e9rieures \u00e0 4.0 pour les syst\u00e8mes d\u0027exploitation suivants : \u003cUL\u003e \u003cLI\u003eMac OS X 10.4.x ;\u003c/LI\u003e \u003cLI\u003eMac OS X 10.5.x ;\u003c/LI\u003e \u003cLI\u003eMac OS X Server 10.4.x ;\u003c/LI\u003e \u003cLI\u003eMac OS X Server 10.5.x ;\u003c/LI\u003e \u003cLI\u003eWindows XP ;\u003c/LI\u003e \u003cLI\u003eWindows Vista.\u003c/LI\u003e \u003c/UL\u003e\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s dans Apple Safari ont \u00e9t\u00e9 corrig\u00e9es dont :\n\n- Des images identifi\u00e9es comme des fichiers HTML permettent\n l\u0027ex\u00e9cution automatique de Javascript ;\n- plusieurs corruptions m\u00e9moire affectant le composant CoreGraphics\n permettent l\u0027ex\u00e9cution de code arbitraire (Microsoft Windows) \u00e0\n distance ;\n- plusieurs vuln\u00e9rabilit\u00e9s affectent le composant WebKit et\n permettent, entre autre, des attaques en XSS ou l\u0027ex\u00e9cution de code\n arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"name": "CVE-2009-1702",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1702"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2009-1697",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1697"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-1710",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1710"
},
{
"name": "CVE-2009-1694",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1694"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2009-1686",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1686"
},
{
"name": "CVE-2009-1688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1688"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2009-1685",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1685"
},
{
"name": "CVE-2009-1696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1696"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2009-1707",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1707"
},
{
"name": "CVE-2009-1709",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1709"
},
{
"name": "CVE-2009-1708",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1708"
},
{
"name": "CVE-2009-1704",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1704"
},
{
"name": "CVE-2009-1698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1698"
},
{
"name": "CVE-2009-1701",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1701"
},
{
"name": "CVE-2009-1682",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1682"
},
{
"name": "CVE-2009-1693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1693"
},
{
"name": "CVE-2009-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1684"
},
{
"name": "CVE-2009-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1705"
},
{
"name": "CVE-2009-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1703"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2009-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1712"
},
{
"name": "CVE-2009-1714",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1714"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2009-1695",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1695"
},
{
"name": "CVE-2008-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3632"
},
{
"name": "CVE-2009-1681",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1681"
},
{
"name": "CVE-2009-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1718"
},
{
"name": "CVE-2008-1588",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1588"
},
{
"name": "CVE-2008-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4409"
},
{
"name": "CVE-2009-1691",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1691"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-1689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1689"
},
{
"name": "CVE-2009-1687",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1687"
},
{
"name": "CVE-2009-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1713"
},
{
"name": "CVE-2009-1699",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1699"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1716"
},
{
"name": "CVE-2009-1706",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1706"
},
{
"name": "CVE-2009-1700",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1700"
},
{
"name": "CVE-2009-1690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1690"
},
{
"name": "CVE-2008-2321",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2321"
},
{
"name": "CVE-2009-1711",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1711"
},
{
"name": "CVE-2008-4231",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4231"
},
{
"name": "CVE-2009-1715",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3613 du 08 juin 2009 :",
"url": "http://support.apple.com/kb/HT3613"
}
],
"reference": "CERTA-2009-AVI-223",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Apple Safari permettant, entre autre,\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3613 du 8 juin 2009",
"url": null
}
]
}
CERTA-2009-AVI-243
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulérabilités permettant de réaliser un grand nombre d'actions malveillantes ont été découvertes dans le système d'exploitation des iPhones et des iPods Touch.
Description
De multiples vulnérabilités ont été découvertes dans le système d'exploitation des iPhones et des iPods Touch. L'exploitation de ces vulnérabilités permet à une personne malveillante de réaliser un grand nombre d'actions, dont l'execution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple iPod Touch Os versions ant\u00e9rieures \u00e0 la version 3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPhone Os versions ant\u00e9rieures \u00e0 la version 3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation des iPhones et des iPods Touch. L\u0027exploitation de ces\nvuln\u00e9rabilit\u00e9s permet \u00e0 une personne malveillante de r\u00e9aliser un grand\nnombre d\u0027actions, dont l\u0027execution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2009-1702",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1702"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2009-1697",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1697"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-1694",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1694"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2009-1686",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1686"
},
{
"name": "CVE-2009-1688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1688"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2009-1685",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1685"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2009-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1683"
},
{
"name": "CVE-2009-1698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1698"
},
{
"name": "CVE-2009-1701",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1701"
},
{
"name": "CVE-2009-1693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1693"
},
{
"name": "CVE-2009-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1684"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2009-1695",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1695"
},
{
"name": "CVE-2008-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3623"
},
{
"name": "CVE-2008-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4409"
},
{
"name": "CVE-2009-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1679"
},
{
"name": "CVE-2009-1692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1692"
},
{
"name": "CVE-2009-1691",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1691"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-1689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1689"
},
{
"name": "CVE-2009-1687",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1687"
},
{
"name": "CVE-2009-1699",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1699"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-1680",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1680"
},
{
"name": "CVE-2009-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0958"
},
{
"name": "CVE-2009-0959",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0959"
},
{
"name": "CVE-2009-1700",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1700"
},
{
"name": "CVE-2009-1690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1690"
},
{
"name": "CVE-2009-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0961"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"links": [],
"reference": "CERTA-2009-AVI-243",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vul\u00e9rabilit\u00e9s permettant de r\u00e9aliser un grand nombre\nd\u0027actions malveillantes ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation des iPhones et des iPods Touch.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de l\u0027OS iPhone et iPod Touch d\u0027Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3639 du 17 juin 2009",
"url": "http://support.apple.com/kb/HT3639"
}
]
}
CERTA-2009-AVI-156
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans CUPS permettent à un utilisateur distant malveillant d'exécuter du code arbitraire ou de porter atteinte à la confidentialité des données.
Description
Plusieurs vulnérabilités présentes dans la commande pdftops, causées par l'usage de code source vulnérable issu de Xpdf, peuvent être exploitées afin de provoquer un déni de service ou d'exécuter du code arbitraire à distance.
Une vulnérabilité de type débordement d'entier durant le traitement d'un fichier au format TIFF peut être exploitée au moyen d'un fichier spécialement construit afin d'exécuter du code arbitraire à distance.
Une erreur dans le traitement des en-têtes Host: permet à une personne malveillante de porter atteinte à la confidentialité des données telles que l'historique des travaux d'impression.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CUPS 1.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans la commande pdftops, caus\u00e9es par\nl\u0027usage de code source vuln\u00e9rable issu de Xpdf, peuvent \u00eatre exploit\u00e9es\nafin de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier durant le traitement d\u0027un\nfichier au format TIFF peut \u00eatre exploit\u00e9e au moyen d\u0027un fichier\nsp\u00e9cialement construit afin d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\nUne erreur dans le traitement des en-t\u00eates Host: permet \u00e0 une personne\nmalveillante de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es telles\nque l\u0027historique des travaux d\u0027impression.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2009-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0799"
},
{
"name": "CVE-2009-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0166"
},
{
"name": "CVE-2009-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1182"
},
{
"name": "CVE-2009-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0195"
},
{
"name": "CVE-2009-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1180"
},
{
"name": "CVE-2009-1183",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1183"
},
{
"name": "CVE-2009-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0800"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-0163",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0163"
},
{
"name": "CVE-2009-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1181"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0429-1 du 16 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0429.html"
},
{
"title": "Notes de s\u00e9curit\u00e9 CUPS STR #3031 et #3118 du 16 avril 2009 :",
"url": "http://cups.org/str.php?L3118"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0458-1 du 30 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"title": "Notes de s\u00e9curit\u00e9 CUPS STR #3031 et #3118 du 16 avril 2009 :",
"url": "http://cups.org/str.php?L3031"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1773 du 17 avril 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1773"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200904-20 du 23 avril 2009 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-759-1 et USN-760-1 du 16 avril 2009 :",
"url": "http://www.ubuntu.com/usn/usn-759-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1790 du 05 mai 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0430-1 du 16 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0430.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:0431-1 du 16 avril 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0431.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-759-1 et USN-760-1 du 16 avril 2009 :",
"url": "http://www.ubuntu.com/usn/usn-760-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2009:024 du 22 avril 2009 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1793 du 06 mai 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1793"
}
],
"reference": "CERTA-2009-AVI-156",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-04-21T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, Debian, RedHat et SuSE.",
"revision_date": "2009-05-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans CUPS permettent \u00e0 un\nutilisateur distant malveillant d\u0027ex\u00e9cuter du code arbitraire ou de\nporter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans cups",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de changements CUPS du 16 avril 2009",
"url": "http://cups.org/articles.php?L582"
}
]
}
CERTA-2009-AVI-223
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans Apple Safari permettant, entre autre, l'exécution de code arbitraire à distance ont été corrigées.
Description
De multiples vulnérabilités dans Apple Safari ont été corrigées dont :
- Des images identifiées comme des fichiers HTML permettent l'exécution automatique de Javascript ;
- plusieurs corruptions mémoire affectant le composant CoreGraphics permettent l'exécution de code arbitraire (Microsoft Windows) à distance ;
- plusieurs vulnérabilités affectent le composant WebKit et permettent, entre autre, des attaques en XSS ou l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Les versions de Safari antérieures à 4.0 pour les systèmes d'exploitation suivants :
- Mac OS X 10.4.x ;
- Mac OS X 10.5.x ;
- Mac OS X Server 10.4.x ;
- Mac OS X Server 10.5.x ;
- Windows XP ;
- Windows Vista.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eLes versions de Safari ant\u00e9rieures \u00e0 4.0 pour les syst\u00e8mes d\u0027exploitation suivants : \u003cUL\u003e \u003cLI\u003eMac OS X 10.4.x ;\u003c/LI\u003e \u003cLI\u003eMac OS X 10.5.x ;\u003c/LI\u003e \u003cLI\u003eMac OS X Server 10.4.x ;\u003c/LI\u003e \u003cLI\u003eMac OS X Server 10.5.x ;\u003c/LI\u003e \u003cLI\u003eWindows XP ;\u003c/LI\u003e \u003cLI\u003eWindows Vista.\u003c/LI\u003e \u003c/UL\u003e\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s dans Apple Safari ont \u00e9t\u00e9 corrig\u00e9es dont :\n\n- Des images identifi\u00e9es comme des fichiers HTML permettent\n l\u0027ex\u00e9cution automatique de Javascript ;\n- plusieurs corruptions m\u00e9moire affectant le composant CoreGraphics\n permettent l\u0027ex\u00e9cution de code arbitraire (Microsoft Windows) \u00e0\n distance ;\n- plusieurs vuln\u00e9rabilit\u00e9s affectent le composant WebKit et\n permettent, entre autre, des attaques en XSS ou l\u0027ex\u00e9cution de code\n arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"name": "CVE-2009-1702",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1702"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2009-1697",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1697"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-1710",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1710"
},
{
"name": "CVE-2009-1694",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1694"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2009-1686",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1686"
},
{
"name": "CVE-2009-1688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1688"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2009-1685",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1685"
},
{
"name": "CVE-2009-1696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1696"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2009-1707",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1707"
},
{
"name": "CVE-2009-1709",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1709"
},
{
"name": "CVE-2009-1708",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1708"
},
{
"name": "CVE-2009-1704",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1704"
},
{
"name": "CVE-2009-1698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1698"
},
{
"name": "CVE-2009-1701",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1701"
},
{
"name": "CVE-2009-1682",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1682"
},
{
"name": "CVE-2009-1693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1693"
},
{
"name": "CVE-2009-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1684"
},
{
"name": "CVE-2009-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1705"
},
{
"name": "CVE-2009-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1703"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2009-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1712"
},
{
"name": "CVE-2009-1714",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1714"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2009-1695",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1695"
},
{
"name": "CVE-2008-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3632"
},
{
"name": "CVE-2009-1681",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1681"
},
{
"name": "CVE-2009-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1718"
},
{
"name": "CVE-2008-1588",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1588"
},
{
"name": "CVE-2008-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4409"
},
{
"name": "CVE-2009-1691",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1691"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-1689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1689"
},
{
"name": "CVE-2009-1687",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1687"
},
{
"name": "CVE-2009-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1713"
},
{
"name": "CVE-2009-1699",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1699"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1716"
},
{
"name": "CVE-2009-1706",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1706"
},
{
"name": "CVE-2009-1700",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1700"
},
{
"name": "CVE-2009-1690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1690"
},
{
"name": "CVE-2008-2321",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2321"
},
{
"name": "CVE-2009-1711",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1711"
},
{
"name": "CVE-2008-4231",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4231"
},
{
"name": "CVE-2009-1715",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3613 du 08 juin 2009 :",
"url": "http://support.apple.com/kb/HT3613"
}
],
"reference": "CERTA-2009-AVI-223",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Apple Safari permettant, entre autre,\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3613 du 8 juin 2009",
"url": null
}
]
}
CERTA-2009-AVI-243
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulérabilités permettant de réaliser un grand nombre d'actions malveillantes ont été découvertes dans le système d'exploitation des iPhones et des iPods Touch.
Description
De multiples vulnérabilités ont été découvertes dans le système d'exploitation des iPhones et des iPods Touch. L'exploitation de ces vulnérabilités permet à une personne malveillante de réaliser un grand nombre d'actions, dont l'execution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple iPod Touch Os versions ant\u00e9rieures \u00e0 la version 3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPhone Os versions ant\u00e9rieures \u00e0 la version 3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation des iPhones et des iPods Touch. L\u0027exploitation de ces\nvuln\u00e9rabilit\u00e9s permet \u00e0 une personne malveillante de r\u00e9aliser un grand\nnombre d\u0027actions, dont l\u0027execution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2009-1702",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1702"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2009-1697",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1697"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-1694",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1694"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2009-1686",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1686"
},
{
"name": "CVE-2009-1688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1688"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2009-1685",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1685"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2009-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1683"
},
{
"name": "CVE-2009-1698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1698"
},
{
"name": "CVE-2009-1701",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1701"
},
{
"name": "CVE-2009-1693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1693"
},
{
"name": "CVE-2009-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1684"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2009-1695",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1695"
},
{
"name": "CVE-2008-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3623"
},
{
"name": "CVE-2008-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4409"
},
{
"name": "CVE-2009-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1679"
},
{
"name": "CVE-2009-1692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1692"
},
{
"name": "CVE-2009-1691",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1691"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-1689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1689"
},
{
"name": "CVE-2009-1687",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1687"
},
{
"name": "CVE-2009-1699",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1699"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-1680",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1680"
},
{
"name": "CVE-2009-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0958"
},
{
"name": "CVE-2009-0959",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0959"
},
{
"name": "CVE-2009-1700",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1700"
},
{
"name": "CVE-2009-1690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1690"
},
{
"name": "CVE-2009-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0961"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"links": [],
"reference": "CERTA-2009-AVI-243",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vul\u00e9rabilit\u00e9s permettant de r\u00e9aliser un grand nombre\nd\u0027actions malveillantes ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation des iPhones et des iPods Touch.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de l\u0027OS iPhone et iPod Touch d\u0027Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3639 du 17 juin 2009",
"url": "http://support.apple.com/kb/HT3639"
}
]
}
FKIE_CVE-2009-1179
Vulnerability from fkie_nvd - Published: 2009-04-23 17:30 - Updated: 2026-04-23 00:35| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html | ||
| secalert@redhat.com | http://poppler.freedesktop.org/releases.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2009-0458.html | ||
| secalert@redhat.com | http://secunia.com/advisories/34291 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34481 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34746 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34755 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34756 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34852 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34959 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34963 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/34991 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35037 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35064 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35065 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35379 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35618 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35685 | Vendor Advisory | |
| secalert@redhat.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT3613 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT3639 | ||
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1790 | ||
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1793 | ||
| secalert@redhat.com | http://www.kb.cert.org/vuls/id/196617 | US Government Resource | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:101 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:087 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:175 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-0429.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-0430.html | Patch | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-0431.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-0480.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/34568 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1022073 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1065 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1066 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1076 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1077 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1522 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1621 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1040 | Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=495889 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892 | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://poppler.freedesktop.org/releases.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2009-0458.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34291 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34481 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34746 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34755 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34756 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34852 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34959 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34963 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34991 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35037 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35064 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35065 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35379 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35618 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35685 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3613 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3639 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1790 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1793 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/196617 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:101 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:087 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:175 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0429.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0430.html | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0431.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0480.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34568 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022073 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1065 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1066 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1076 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1077 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1522 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1621 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1040 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=495889 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html |
| Vendor | Product | Version | |
|---|---|---|---|
| foolabs | xpdf | 0.5a | |
| foolabs | xpdf | 0.7a | |
| foolabs | xpdf | 0.91a | |
| foolabs | xpdf | 0.91b | |
| foolabs | xpdf | 0.91c | |
| foolabs | xpdf | 0.92a | |
| foolabs | xpdf | 0.92b | |
| foolabs | xpdf | 0.92c | |
| foolabs | xpdf | 0.92d | |
| foolabs | xpdf | 0.92e | |
| foolabs | xpdf | 0.93a | |
| foolabs | xpdf | 0.93b | |
| foolabs | xpdf | 0.93c | |
| foolabs | xpdf | 1.00a | |
| glyphandcog | xpdfreader | * | |
| glyphandcog | xpdfreader | 0.2 | |
| glyphandcog | xpdfreader | 0.3 | |
| glyphandcog | xpdfreader | 0.4 | |
| glyphandcog | xpdfreader | 0.5 | |
| glyphandcog | xpdfreader | 0.6 | |
| glyphandcog | xpdfreader | 0.7 | |
| glyphandcog | xpdfreader | 0.80 | |
| glyphandcog | xpdfreader | 0.90 | |
| glyphandcog | xpdfreader | 0.91 | |
| glyphandcog | xpdfreader | 0.92 | |
| glyphandcog | xpdfreader | 0.93 | |
| glyphandcog | xpdfreader | 1.00 | |
| glyphandcog | xpdfreader | 1.01 | |
| glyphandcog | xpdfreader | 2.00 | |
| glyphandcog | xpdfreader | 2.01 | |
| glyphandcog | xpdfreader | 2.02 | |
| glyphandcog | xpdfreader | 2.03 | |
| glyphandcog | xpdfreader | 3.00 | |
| glyphandcog | xpdfreader | 3.01 | |
| poppler | poppler | * | |
| poppler | poppler | 0.1 | |
| poppler | poppler | 0.1.1 | |
| poppler | poppler | 0.1.2 | |
| poppler | poppler | 0.2.0 | |
| poppler | poppler | 0.3.0 | |
| poppler | poppler | 0.3.1 | |
| poppler | poppler | 0.3.2 | |
| poppler | poppler | 0.3.3 | |
| poppler | poppler | 0.4.0 | |
| poppler | poppler | 0.4.1 | |
| poppler | poppler | 0.4.2 | |
| poppler | poppler | 0.4.3 | |
| poppler | poppler | 0.4.4 | |
| poppler | poppler | 0.5.0 | |
| poppler | poppler | 0.5.1 | |
| poppler | poppler | 0.5.2 | |
| poppler | poppler | 0.5.3 | |
| poppler | poppler | 0.5.4 | |
| poppler | poppler | 0.5.9 | |
| poppler | poppler | 0.5.90 | |
| poppler | poppler | 0.5.91 | |
| poppler | poppler | 0.6.0 | |
| poppler | poppler | 0.6.1 | |
| poppler | poppler | 0.6.2 | |
| poppler | poppler | 0.6.3 | |
| poppler | poppler | 0.6.4 | |
| poppler | poppler | 0.7.0 | |
| poppler | poppler | 0.7.1 | |
| poppler | poppler | 0.7.2 | |
| poppler | poppler | 0.7.3 | |
| poppler | poppler | 0.8.0 | |
| poppler | poppler | 0.8.1 | |
| poppler | poppler | 0.8.2 | |
| poppler | poppler | 0.8.3 | |
| poppler | poppler | 0.8.4 | |
| poppler | poppler | 0.8.5 | |
| poppler | poppler | 0.8.6 | |
| poppler | poppler | 0.8.7 | |
| poppler | poppler | 0.9.0 | |
| poppler | poppler | 0.9.1 | |
| poppler | poppler | 0.9.2 | |
| poppler | poppler | 0.9.3 | |
| poppler | poppler | 0.10.0 | |
| poppler | poppler | 0.10.1 | |
| poppler | poppler | 0.10.2 | |
| poppler | poppler | 0.10.3 | |
| poppler | poppler | 0.10.4 | |
| apple | cups | * | |
| apple | cups | 1.1 | |
| apple | cups | 1.1.1 | |
| apple | cups | 1.1.2 | |
| apple | cups | 1.1.3 | |
| apple | cups | 1.1.4 | |
| apple | cups | 1.1.5 | |
| apple | cups | 1.1.5-1 | |
| apple | cups | 1.1.5-2 | |
| apple | cups | 1.1.6 | |
| apple | cups | 1.1.6-1 | |
| apple | cups | 1.1.6-2 | |
| apple | cups | 1.1.6-3 | |
| apple | cups | 1.1.7 | |
| apple | cups | 1.1.8 | |
| apple | cups | 1.1.9 | |
| apple | cups | 1.1.9-1 | |
| apple | cups | 1.1.10 | |
| apple | cups | 1.1.10-1 | |
| apple | cups | 1.1.11 | |
| apple | cups | 1.1.12 | |
| apple | cups | 1.1.13 | |
| apple | cups | 1.1.14 | |
| apple | cups | 1.1.15 | |
| apple | cups | 1.1.16 | |
| apple | cups | 1.1.17 | |
| apple | cups | 1.1.18 | |
| apple | cups | 1.1.19 | |
| apple | cups | 1.1.19 | |
| apple | cups | 1.1.19 | |
| apple | cups | 1.1.19 | |
| apple | cups | 1.1.19 | |
| apple | cups | 1.1.19 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.20 | |
| apple | cups | 1.1.21 | |
| apple | cups | 1.1.21 | |
| apple | cups | 1.1.21 | |
| apple | cups | 1.1.22 | |
| apple | cups | 1.1.22 | |
| apple | cups | 1.1.22 | |
| apple | cups | 1.1.23 | |
| apple | cups | 1.1.23 | |
| apple | cups | 1.2.0 | |
| apple | cups | 1.2.1 | |
| apple | cups | 1.2.2 | |
| apple | cups | 1.2.3 | |
| apple | cups | 1.2.4 | |
| apple | cups | 1.2.5 | |
| apple | cups | 1.2.6 | |
| apple | cups | 1.2.7 | |
| apple | cups | 1.2.8 | |
| apple | cups | 1.2.9 | |
| apple | cups | 1.2.10 | |
| apple | cups | 1.2.11 | |
| apple | cups | 1.2.12 | |
| apple | cups | 1.3.0 | |
| apple | cups | 1.3.1 | |
| apple | cups | 1.3.2 | |
| apple | cups | 1.3.3 | |
| apple | cups | 1.3.4 | |
| apple | cups | 1.3.5 | |
| apple | cups | 1.3.6 | |
| apple | cups | 1.3.7 | |
| apple | cups | 1.3.8 | |
| apple | cups | 1.3.10 | |
| apple | cups | 1.3.11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "B8ABE533-8FC1-45E6-B574-A4CC7571EF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*",
"matchCriteriaId": "1B02805E-7BD0-4563-82C8-6FFB982D4913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*",
"matchCriteriaId": "852F526D-F388-4FF0-BDD9-DF7635DB46D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*",
"matchCriteriaId": "478D53EA-CC8C-4ECB-8410-0910505AD819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*",
"matchCriteriaId": "8C84FB90-FF1C-4502-B2D2-390438DD422F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*",
"matchCriteriaId": "13341DAE-D16D-41A7-BF17-FEC802997B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*",
"matchCriteriaId": "3E30BAEA-231C-4A82-B014-9EE3D1E81545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1DE5A5-6448-43F6-A612-56998D16E6B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*",
"matchCriteriaId": "35F84699-D4CF-4FD1-A959-53E316559EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*",
"matchCriteriaId": "D820DFD5-0EF9-4C9A-B281-D553A4F63141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EFC7E4-E513-42DB-BDA5-8D1E497971DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA5CDDC-BFDE-4C5E-920F-5DA1B3C51B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CF839D-D034-4D47-977F-7E27B36EF04F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B3E8A4-14FE-42DA-B82E-839B092B5302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32628280-E2DB-45E0-AB8A-CFC90419A182",
"versionEndIncluding": "3.02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF5EC54-9145-4B51-8241-C9343160BF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D33C2C1D-C1C1-4B1D-BDC8-6480CE8EC24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1344DF7-9917-4DB0-9256-9E8131C55B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "309F0CF2-4AF7-4F46-91EA-39BA07BAF312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "36FA872B-74B8-48E4-9D5C-5ACA6FCB8026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "20311EDE-0E34-432A-AE41-F61EA68F134A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "16FEF460-3569-4294-ABA4-D7C251D67071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "BB41E8C2-BBCC-48CB-805B-23411D39E936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*",
"matchCriteriaId": "16670F8A-E70B-4CDF-8C61-414D86E20C84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*",
"matchCriteriaId": "69483A91-53DB-4736-908F-7B14EFB40888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3E7962-0A95-4E7B-A983-683B02350B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1120B3-3372-417B-BCA0-FD515638FBFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "F7397645-3225-4980-8465-28F93322B58B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "1672587F-ED28-4A8A-A6C1-AD1D6B5DF9F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A45EAF-B511-4360-A201-D588E7EEB39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D14637F7-DC99-4AC4-854C-DBA0B4C6BE54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "9EE03979-D564-4ABD-BEBD-E86E7C1BAF9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "15D08CFD-BEE1-4DEE-926D-F4291F88224D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D244903F-5407-4C35-AE2C-1A05D3C227D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0299F4A-A027-430C-9A53-AFEF9022960C",
"versionEndIncluding": "0.10.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E23EBF88-10DE-4EA6-9F0E-F33C88541F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54F75CFD-3523-4017-992C-4FA6406D49F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB116A19-6436-40BE-B5C6-32C22D888B9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4C1429-593B-47B6-AC84-832F2296FAB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18240BA6-3390-4925-AC25-DA4C42397CF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3090A142-2240-4A8D-A122-C037931A277C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD63240-4599-4212-8AF2-7C4089CA9D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C7EE965-EE3F-4B17-AF38-FA3AA0B11164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE488E5-B3D9-4723-ABBA-A8753EC2DA2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1259C59E-517F-40BE-8BA6-01AB76257C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "576152B4-9ACD-4C4E-B423-4A5EF44332D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "322F9E62-6A74-4805-8F6B-9C61739B2D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F51C453F-6A87-49FB-83F6-22316F28161F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "75F532F0-6653-4275-A85A-BD9A9A611E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC7300E-0CBE-47FD-A241-B4B4F0164EBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "255102DA-A2C0-4795-9539-B4CBD587554A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "349B06F1-772A-4A12-A7B9-EA220ED96D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B779800A-FF4B-47DD-B56F-77D10D6A335C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*",
"matchCriteriaId": "F0213390-08FA-4E04-835B-8BE0FC61B464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*",
"matchCriteriaId": "0B304657-740A-4F8D-99CD-22E283FEE6F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "178680C2-DB1B-4250-9B6E-6ADABA60DE44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA9036F-92DA-45C2-9FBC-DE03444D34F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6855B98-DAA2-4850-A765-2F4D6D93A424",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4743EC55-B61D-4C1A-9ED7-060268F2DB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8CD4454E-3D2B-4582-B5E5-0317A6417654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96402B67-A7A8-44E3-914E-A10A69FAD735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "66C608C8-F382-4D6B-A638-98763C1CBB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "21F0F4E0-91B7-4B1F-BFA9-829101A7F90A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22287102-80B1-4E1F-85E4-488B020A51E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3030D6-DE07-418B-AB40-87C85FCA3C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3583D56-F653-457A-B1F8-25842A15CB82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEA5DBB-5A80-439E-A135-77CB40772916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A5C43B-3978-4D0A-8166-A99622106781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2A940AF2-A7CA-408F-86E2-797C7BA8A6BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B2CD8A0-2DBA-4AC9-A97D-D4DAEB6C7A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AA56CB7C-E7B3-4F0B-8BEB-F133FAF0D6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6323ED7A-6FE8-4885-B743-3E2F82ECA08B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90D3345C-2D35-413C-B6F9-C308BC7C2AA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "26216EEC-26B7-41C8-ADFB-64D2EA8DAA8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3618D-A183-4B09-9CA2-8D622C3486DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A88294D9-563E-4AB3-9FE6-971F43B052B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A39F672-B238-4B21-A48E-5121771949F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58A5D199-E952-44B5-B5E5-170040FA813E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "349B4B75-32E2-49FB-9606-8B057AFA2E3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "55A8D058-224E-467E-AB61-06F90B541F24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "77C47EDD-2212-4259-8229-FF05E1A7B5AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E90153-8D18-4A50-9581-895C851F6489",
"versionEndIncluding": "1.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D89E03-94D0-4F7F-9A54-3021E3E5A321",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298D6BE7-7683-4225-8DD6-4C0FC5EB48BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "230B77E7-B1AE-4470-859D-7B5F99749D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6070FC-4566-4314-940E-0AAE34B56E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BC691F07-8B38-4867-AB18-51F380CAEA46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"matchCriteriaId": "E943EFBF-39A7-408F-8AC5-677E83DFDBB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA7725A-4398-4C76-BEBF-10E56C7F34F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7415295-0FBF-4946-8D99-8CB2EC391319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C702EE3-4B7C-42EA-92AA-8717807CF67C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"matchCriteriaId": "73F74581-D71C-4FEC-BA8C-85EF4C1991BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABCFB52-33D3-428C-B1D5-DCE504170A37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "45F03F2B-6AC3-4872-9032-293C2E9B837C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7E02B6FB-C36D-45F3-95F3-566CA03B29A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "96093309-A87D-48D0-84DA-446255ABF231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF67F149-614B-4507-A15F-E557A1B73423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"matchCriteriaId": "49862F77-B8DE-4AA7-AE17-B348B05AC00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "78D7719F-03E0-4E66-A50A-F8E857A9B6AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F3139FDA-9476-4414-B349-7119E63FD268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "523FE78C-441F-4ACD-B9F2-3E5293E277AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F887B5B1-7528-4086-AE6C-134F54A93342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C5C552-6276-4791-80CD-6B3EB425EF04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5279D055-248A-4BD1-9FBB-0024BA16DF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "16519855-FCB9-44A8-9C7E-116192327BAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1D9330B-C51A-4C7D-A322-85103C64D86C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2DA0C19F-95EB-429C-AF06-A2C1D5643662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "225CCE80-FF4B-4B39-B8BD-EB4710047524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "07925DD8-50C0-4908-95D1-7342A4617BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "48A519DB-6C6D-4094-814D-33BD5EF389BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B6ED7566-5092-4B08-97A9-B2B53117A224",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "98DCAC0C-896F-4353-A665-5BCD0D8AEBA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E72614CD-8F70-4E07-AD83-8FDE8026CEC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"matchCriteriaId": "48E62419-C165-4B42-8C23-E24821BD4BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"matchCriteriaId": "217D804B-CA56-49CE-B9EB-2A297EB1763C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"matchCriteriaId": "A41E8583-C837-4871-B4D2-FD41C78D538E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D480C37B-0DA8-4096-80B0-5198FE589A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"matchCriteriaId": "74F5A83B-3C1A-49F3-A9D6-F7B9B897E447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"matchCriteriaId": "241D4183-879D-4974-BACB-A6987EDA2E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8758715D-B973-4960-8B7D-6F9A11E73288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0370E9EB-B830-4362-B83C-912579695691",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D644926A-C2A5-45FE-85A3-2782CE87ED86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0696E675-0A13-45FC-8917-845E6FF7A311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78BAC98C-1FE6-42A3-8B62-E3C321914F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC3EF2F-0140-4185-9FB3-2B595B61CDC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7C36785A-F735-45C0-986B-9624AD65F0C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1D3916-607F-44E8-9D47-93C6C0789083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "174613C3-A04B-4701-849B-BAA598BF4F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "81C1137C-BE3D-45F9-83C9-D212107F0E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBC1F81-E93A-42A7-8BC8-4B903688F2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA876FF-C58A-45CF-A8E8-E2068DF79421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD78771-BD9A-4AC2-B664-B189DD288FB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "50A16424-732F-4B76-A753-1642A97BC1EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E189C976-2DD2-485C-828E-7FC3DC6A8F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A86CA90F-A944-4F3E-B75F-8147125335D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FAFABDC-E40F-4C53-AC66-94EFD077665D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F96C1B80-9E20-4832-8308-BF7911569EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2D7DB3-F467-4BC0-83BB-4706D067A2C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46C394DC-65A7-4713-B823-6F5D329A0C5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E9F74F-3C7D-486A-8BA1-EE2A73160B39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "69BD64BB-BDA7-4F82-8324-B7C7C941133C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D8814509-8B08-46C6-AE50-19B7D30DCF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0718FB6B-D787-409A-B535-0318F2C63A81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file."
},
{
"lang": "es",
"value": "Desbordamiento de enteros en el decodificador JBIG2 en Xpdf versi\u00f3n 3.02 PL2 y anteriores, CUPS versi\u00f3n 1.3.9 y anteriores, Poppler versi\u00f3n anterior a 0.10.6, y otros productos permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado."
}
],
"id": "CVE-2009-1179",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-04-23T17:30:01.750",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34291"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34481"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34746"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34755"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34756"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34852"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34959"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34963"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34991"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35037"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35064"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35065"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35379"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35618"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35685"
},
{
"source": "secalert@redhat.com",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT3613"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT3639"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"source": "secalert@redhat.com",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/34568"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1022073"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1040"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34481"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34755"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34959"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34963"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34991"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35064"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35618"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35685"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3613"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3639"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022073"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-P2P8-HC72-RJJM
Vulnerability from github – Published: 2022-05-02 03:22 – Updated: 2022-05-02 03:22Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
{
"affected": [],
"aliases": [
"CVE-2009-1179"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-04-23T17:30:00Z",
"severity": "MODERATE"
},
"details": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.",
"id": "GHSA-p2p8-hc72-rjjm",
"modified": "2022-05-02T03:22:29Z",
"published": "2022-05-02T03:22:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1179"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2009:0429"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2009:0430"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2009:0431"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2009:0458"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2009:0480"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0399"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0400"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2009-1179"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"type": "WEB",
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34291"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34481"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34746"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34755"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34756"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34852"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34959"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34963"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34991"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35037"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35064"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35065"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35379"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35618"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35685"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3613"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3639"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/34568"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022073"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/1040"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2009-1179
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-1179",
"description": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.",
"id": "GSD-2009-1179",
"references": [
"https://www.suse.com/security/cve/CVE-2009-1179.html",
"https://www.debian.org/security/2009/dsa-1793",
"https://www.debian.org/security/2009/dsa-1790",
"https://access.redhat.com/errata/RHSA-2010:0400",
"https://access.redhat.com/errata/RHSA-2010:0399",
"https://access.redhat.com/errata/RHSA-2009:0480",
"https://access.redhat.com/errata/RHSA-2009:0458",
"https://access.redhat.com/errata/RHSA-2009:0431",
"https://access.redhat.com/errata/RHSA-2009:0430",
"https://access.redhat.com/errata/RHSA-2009:0429",
"https://linux.oracle.com/cve/CVE-2009-1179.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-1179"
],
"details": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.",
"id": "GSD-2009-1179",
"modified": "2023-12-13T01:19:47.566950Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1179",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "http://secunia.com/advisories/35685",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35685"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"name": "http://secunia.com/advisories/35065",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35065"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"name": "http://poppler.freedesktop.org/releases.html",
"refsource": "MISC",
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2009-0458.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"name": "http://secunia.com/advisories/34291",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34291"
},
{
"name": "http://secunia.com/advisories/34481",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34481"
},
{
"name": "http://secunia.com/advisories/34746",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34746"
},
{
"name": "http://secunia.com/advisories/34755",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34755"
},
{
"name": "http://secunia.com/advisories/34756",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34756"
},
{
"name": "http://secunia.com/advisories/34852",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34852"
},
{
"name": "http://secunia.com/advisories/34959",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34959"
},
{
"name": "http://secunia.com/advisories/34963",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34963"
},
{
"name": "http://secunia.com/advisories/34991",
"refsource": "MISC",
"url": "http://secunia.com/advisories/34991"
},
{
"name": "http://secunia.com/advisories/35037",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35037"
},
{
"name": "http://secunia.com/advisories/35064",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35064"
},
{
"name": "http://secunia.com/advisories/35618",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35618"
},
{
"name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477",
"refsource": "MISC",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"name": "http://www.debian.org/security/2009/dsa-1790",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"name": "http://www.debian.org/security/2009/dsa-1793",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"name": "http://www.kb.cert.org/vuls/id/196617",
"refsource": "MISC",
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-0429.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-0430.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-0431.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-0480.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"name": "http://www.securityfocus.com/bid/34568",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/34568"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1065",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1066",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1076",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1077",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"name": "http://www.vupen.com/english/advisories/2010/1040",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/1040"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
},
{
"name": "http://www.securitytracker.com/id?1022073",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1022073"
},
{
"name": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"name": "http://secunia.com/advisories/35379",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35379"
},
{
"name": "http://support.apple.com/kb/HT3613",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT3613"
},
{
"name": "http://support.apple.com/kb/HT3639",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1522",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1621",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=495889",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.02",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.10.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1179"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=495889",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889"
},
{
"name": "RHSA-2009:0430",
"refsource": "REDHAT",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0430.html"
},
{
"name": "34755",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34755"
},
{
"name": "ADV-2009-1066",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1066"
},
{
"name": "34852",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34852"
},
{
"name": "34746",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34746"
},
{
"name": "ADV-2009-1076",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1076"
},
{
"name": "34481",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34481"
},
{
"name": "SUSE-SA:2009:024",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
},
{
"name": "ADV-2009-1065",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1065"
},
{
"name": "http://poppler.freedesktop.org/releases.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://poppler.freedesktop.org/releases.html"
},
{
"name": "RHSA-2009:0431",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0431.html"
},
{
"name": "RHSA-2009:0429",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0429.html"
},
{
"name": "34291",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34291"
},
{
"name": "1022073",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022073"
},
{
"name": "34568",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/34568"
},
{
"name": "ADV-2009-1077",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1077"
},
{
"name": "34756",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34756"
},
{
"name": "VU#196617",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/196617"
},
{
"name": "MDVSA-2009:101",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:101"
},
{
"name": "DSA-1790",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1790"
},
{
"name": "34959",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34959"
},
{
"name": "RHSA-2009:0458",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2009-0458.html"
},
{
"name": "34963",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34963"
},
{
"name": "35037",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35037"
},
{
"name": "SSA:2009-129-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
},
{
"name": "SUSE-SR:2009:010",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"name": "35065",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35065"
},
{
"name": "RHSA-2009:0480",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-0480.html"
},
{
"name": "DSA-1793",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1793"
},
{
"name": "34991",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34991"
},
{
"name": "35064",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35064"
},
{
"name": "APPLE-SA-2009-06-08-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
},
{
"name": "35379",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35379"
},
{
"name": "ADV-2009-1522",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"name": "http://support.apple.com/kb/HT3613",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3613"
},
{
"name": "ADV-2009-1621",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "http://support.apple.com/kb/HT3639",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "APPLE-SA-2009-06-17-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "SUSE-SR:2009:012",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "35618",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35618"
},
{
"name": "FEDORA-2009-6982",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html"
},
{
"name": "FEDORA-2009-6973",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html"
},
{
"name": "35685",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35685"
},
{
"name": "FEDORA-2009-6972",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html"
},
{
"name": "ADV-2010-1040",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1040"
},
{
"name": "MDVSA-2010:087",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"
},
{
"name": "MDVSA-2011:175",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:175"
},
{
"name": "oval:org.mitre.oval:def:11892",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11892"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:19Z",
"publishedDate": "2009-04-23T17:30Z"
}
}
}
OPENSUSE-SU-2024:10360-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2009-0799/ | self |
| https://www.suse.com/security/cve/CVE-2009-0800/ | self |
| https://www.suse.com/security/cve/CVE-2009-1179/ | self |
| https://www.suse.com/security/cve/CVE-2009-1180/ | self |
| https://www.suse.com/security/cve/CVE-2009-1181/ | self |
| https://www.suse.com/security/cve/CVE-2009-1182/ | self |
| https://www.suse.com/security/cve/CVE-2009-1183/ | self |
| https://www.suse.com/security/cve/CVE-2009-1187/ | self |
| https://www.suse.com/security/cve/CVE-2009-1188/ | self |
| https://www.suse.com/security/cve/CVE-2009-3607/ | self |
| https://www.suse.com/security/cve/CVE-2009-3608/ | self |
| https://www.suse.com/security/cve/CVE-2013-1788/ | self |
| https://www.suse.com/security/cve/CVE-2013-1789/ | self |
| https://www.suse.com/security/cve/CVE-2013-1790/ | self |
| https://www.suse.com/security/cve/CVE-2013-4473/ | self |
| https://www.suse.com/security/cve/CVE-2013-4474/ | self |
| https://www.suse.com/security/cve/CVE-2009-0799 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-0800 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-1179 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-1180 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-1181 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-1182 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-1183 | external |
| https://bugzilla.suse.com/487100 | external |
| https://www.suse.com/security/cve/CVE-2009-1187 | external |
| https://bugzilla.suse.com/487100 | external |
| https://bugzilla.suse.com/508153 | external |
| https://bugzilla.suse.com/508154 | external |
| https://bugzilla.suse.com/539875 | external |
| https://bugzilla.suse.com/566697 | external |
| https://www.suse.com/security/cve/CVE-2009-1188 | external |
| https://bugzilla.suse.com/487100 | external |
| https://bugzilla.suse.com/508153 | external |
| https://bugzilla.suse.com/508154 | external |
| https://bugzilla.suse.com/539875 | external |
| https://bugzilla.suse.com/546400 | external |
| https://bugzilla.suse.com/566697 | external |
| https://www.suse.com/security/cve/CVE-2009-3607 | external |
| https://bugzilla.suse.com/546393 | external |
| https://bugzilla.suse.com/566697 | external |
| https://www.suse.com/security/cve/CVE-2009-3608 | external |
| https://bugzilla.suse.com/543090 | external |
| https://bugzilla.suse.com/543410 | external |
| https://bugzilla.suse.com/546400 | external |
| https://bugzilla.suse.com/546404 | external |
| https://bugzilla.suse.com/556049 | external |
| https://bugzilla.suse.com/566697 | external |
| https://www.suse.com/security/cve/CVE-2013-1788 | external |
| https://bugzilla.suse.com/806793 | external |
| https://www.suse.com/security/cve/CVE-2013-1789 | external |
| https://bugzilla.suse.com/806793 | external |
| https://www.suse.com/security/cve/CVE-2013-1790 | external |
| https://bugzilla.suse.com/806793 | external |
| https://www.suse.com/security/cve/CVE-2013-4473 | external |
| https://bugzilla.suse.com/847907 | external |
| https://www.suse.com/security/cve/CVE-2013-4474 | external |
| https://bugzilla.suse.com/847907 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libpoppler-cpp0-0.49.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libpoppler-cpp0-0.49.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10360",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10360-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0799 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0800 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1179 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1180 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1181 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1182 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1183 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1187 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1188 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3607 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3608 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1788 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1789 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1790 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1790/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4473 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4474 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4474/"
}
],
"title": "libpoppler-cpp0-0.49.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10360-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpoppler-cpp0-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-cpp0-0.49.0-1.1.aarch64",
"product_id": "libpoppler-cpp0-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"product_id": "libpoppler-cpp0-32bit-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-devel-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-devel-0.49.0-1.1.aarch64",
"product_id": "libpoppler-devel-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-glib-devel-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-glib-devel-0.49.0-1.1.aarch64",
"product_id": "libpoppler-glib-devel-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-glib8-0.49.0-1.1.aarch64",
"product_id": "libpoppler-glib8-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"product_id": "libpoppler-glib8-32bit-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-qt4-4-0.49.0-1.1.aarch64",
"product_id": "libpoppler-qt4-4-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"product_id": "libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"product_id": "libpoppler-qt4-devel-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-qt5-1-0.49.0-1.1.aarch64",
"product_id": "libpoppler-qt5-1-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"product_id": "libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"product_id": "libpoppler-qt5-devel-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler65-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler65-0.49.0-1.1.aarch64",
"product_id": "libpoppler65-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpoppler65-32bit-0.49.0-1.1.aarch64",
"product": {
"name": "libpoppler65-32bit-0.49.0-1.1.aarch64",
"product_id": "libpoppler65-32bit-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "poppler-tools-0.49.0-1.1.aarch64",
"product": {
"name": "poppler-tools-0.49.0-1.1.aarch64",
"product_id": "poppler-tools-0.49.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"product": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"product_id": "typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpoppler-cpp0-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-cpp0-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-cpp0-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-devel-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-devel-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-devel-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-glib-devel-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-glib8-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-glib8-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-glib8-32bit-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-qt4-4-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-qt4-devel-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-qt5-1-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"product_id": "libpoppler-qt5-devel-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler65-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler65-0.49.0-1.1.ppc64le",
"product_id": "libpoppler65-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpoppler65-32bit-0.49.0-1.1.ppc64le",
"product": {
"name": "libpoppler65-32bit-0.49.0-1.1.ppc64le",
"product_id": "libpoppler65-32bit-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "poppler-tools-0.49.0-1.1.ppc64le",
"product": {
"name": "poppler-tools-0.49.0-1.1.ppc64le",
"product_id": "poppler-tools-0.49.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"product": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"product_id": "typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpoppler-cpp0-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-cpp0-0.49.0-1.1.s390x",
"product_id": "libpoppler-cpp0-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"product_id": "libpoppler-cpp0-32bit-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-devel-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-devel-0.49.0-1.1.s390x",
"product_id": "libpoppler-devel-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-glib-devel-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-glib-devel-0.49.0-1.1.s390x",
"product_id": "libpoppler-glib-devel-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-glib8-0.49.0-1.1.s390x",
"product_id": "libpoppler-glib8-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"product_id": "libpoppler-glib8-32bit-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-qt4-4-0.49.0-1.1.s390x",
"product_id": "libpoppler-qt4-4-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"product_id": "libpoppler-qt4-4-32bit-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-devel-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.s390x",
"product_id": "libpoppler-qt4-devel-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-qt5-1-0.49.0-1.1.s390x",
"product_id": "libpoppler-qt5-1-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"product_id": "libpoppler-qt5-1-32bit-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-devel-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.s390x",
"product_id": "libpoppler-qt5-devel-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler65-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler65-0.49.0-1.1.s390x",
"product_id": "libpoppler65-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpoppler65-32bit-0.49.0-1.1.s390x",
"product": {
"name": "libpoppler65-32bit-0.49.0-1.1.s390x",
"product_id": "libpoppler65-32bit-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "poppler-tools-0.49.0-1.1.s390x",
"product": {
"name": "poppler-tools-0.49.0-1.1.s390x",
"product_id": "poppler-tools-0.49.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"product": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"product_id": "typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpoppler-cpp0-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-cpp0-0.49.0-1.1.x86_64",
"product_id": "libpoppler-cpp0-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"product_id": "libpoppler-cpp0-32bit-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-devel-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-devel-0.49.0-1.1.x86_64",
"product_id": "libpoppler-devel-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-glib-devel-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-glib-devel-0.49.0-1.1.x86_64",
"product_id": "libpoppler-glib-devel-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-glib8-0.49.0-1.1.x86_64",
"product_id": "libpoppler-glib8-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"product_id": "libpoppler-glib8-32bit-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-qt4-4-0.49.0-1.1.x86_64",
"product_id": "libpoppler-qt4-4-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"product_id": "libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"product_id": "libpoppler-qt4-devel-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-qt5-1-0.49.0-1.1.x86_64",
"product_id": "libpoppler-qt5-1-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"product_id": "libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"product_id": "libpoppler-qt5-devel-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler65-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler65-0.49.0-1.1.x86_64",
"product_id": "libpoppler65-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpoppler65-32bit-0.49.0-1.1.x86_64",
"product": {
"name": "libpoppler65-32bit-0.49.0-1.1.x86_64",
"product_id": "libpoppler65-32bit-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "poppler-tools-0.49.0-1.1.x86_64",
"product": {
"name": "poppler-tools-0.49.0-1.1.x86_64",
"product_id": "poppler-tools-0.49.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64",
"product": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64",
"product_id": "typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-cpp0-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-cpp0-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-cpp0-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-cpp0-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-cpp0-32bit-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-devel-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-devel-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-devel-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-devel-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-devel-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-devel-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-devel-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-devel-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib-devel-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-glib-devel-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib-devel-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib-devel-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-glib-devel-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib-devel-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-glib-devel-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-glib8-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-glib8-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-glib8-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-glib8-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-glib8-32bit-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-qt4-4-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-qt4-4-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-qt4-4-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-qt4-devel-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt4-devel-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-qt5-1-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-qt5-1-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-qt5-1-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler-qt5-devel-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler-qt5-devel-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler65-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler65-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler65-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler65-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-32bit-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64"
},
"product_reference": "libpoppler65-32bit-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-32bit-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le"
},
"product_reference": "libpoppler65-32bit-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-32bit-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x"
},
"product_reference": "libpoppler65-32bit-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler65-32bit-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64"
},
"product_reference": "libpoppler65-32bit-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-tools-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64"
},
"product_reference": "poppler-tools-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-tools-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le"
},
"product_reference": "poppler-tools-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-tools-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x"
},
"product_reference": "poppler-tools-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-tools-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64"
},
"product_reference": "poppler-tools-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64"
},
"product_reference": "typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le"
},
"product_reference": "typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x"
},
"product_reference": "typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
},
"product_reference": "typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0799"
}
],
"notes": [
{
"category": "general",
"text": "The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0799",
"url": "https://www.suse.com/security/cve/CVE-2009-0799"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-0799",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-0799"
},
{
"cve": "CVE-2009-0800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0800"
}
],
"notes": [
{
"category": "general",
"text": "Multiple \"input validation flaws\" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0800",
"url": "https://www.suse.com/security/cve/CVE-2009-0800"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-0800",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-0800"
},
{
"cve": "CVE-2009-1179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1179"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1179",
"url": "https://www.suse.com/security/cve/CVE-2009-1179"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1179",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1179"
},
{
"cve": "CVE-2009-1180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1180"
}
],
"notes": [
{
"category": "general",
"text": "The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1180",
"url": "https://www.suse.com/security/cve/CVE-2009-1180"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1180",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1180"
},
{
"cve": "CVE-2009-1181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1181"
}
],
"notes": [
{
"category": "general",
"text": "The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1181",
"url": "https://www.suse.com/security/cve/CVE-2009-1181"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1181",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1181"
},
{
"cve": "CVE-2009-1182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1182"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1182",
"url": "https://www.suse.com/security/cve/CVE-2009-1182"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1182",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-1182"
},
{
"cve": "CVE-2009-1183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1183"
}
],
"notes": [
{
"category": "general",
"text": "The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1183",
"url": "https://www.suse.com/security/cve/CVE-2009-1183"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1183",
"url": "https://bugzilla.suse.com/487100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1183"
},
{
"cve": "CVE-2009-1187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1187"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1187",
"url": "https://www.suse.com/security/cve/CVE-2009-1187"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1187",
"url": "https://bugzilla.suse.com/487100"
},
{
"category": "external",
"summary": "SUSE Bug 508153 for CVE-2009-1187",
"url": "https://bugzilla.suse.com/508153"
},
{
"category": "external",
"summary": "SUSE Bug 508154 for CVE-2009-1187",
"url": "https://bugzilla.suse.com/508154"
},
{
"category": "external",
"summary": "SUSE Bug 539875 for CVE-2009-1187",
"url": "https://bugzilla.suse.com/539875"
},
{
"category": "external",
"summary": "SUSE Bug 566697 for CVE-2009-1187",
"url": "https://bugzilla.suse.com/566697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1187"
},
{
"cve": "CVE-2009-1188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1188"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1188",
"url": "https://www.suse.com/security/cve/CVE-2009-1188"
},
{
"category": "external",
"summary": "SUSE Bug 487100 for CVE-2009-1188",
"url": "https://bugzilla.suse.com/487100"
},
{
"category": "external",
"summary": "SUSE Bug 508153 for CVE-2009-1188",
"url": "https://bugzilla.suse.com/508153"
},
{
"category": "external",
"summary": "SUSE Bug 508154 for CVE-2009-1188",
"url": "https://bugzilla.suse.com/508154"
},
{
"category": "external",
"summary": "SUSE Bug 539875 for CVE-2009-1188",
"url": "https://bugzilla.suse.com/539875"
},
{
"category": "external",
"summary": "SUSE Bug 546400 for CVE-2009-1188",
"url": "https://bugzilla.suse.com/546400"
},
{
"category": "external",
"summary": "SUSE Bug 566697 for CVE-2009-1188",
"url": "https://bugzilla.suse.com/566697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1188"
},
{
"cve": "CVE-2009-3607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3607"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3607",
"url": "https://www.suse.com/security/cve/CVE-2009-3607"
},
{
"category": "external",
"summary": "SUSE Bug 546393 for CVE-2009-3607",
"url": "https://bugzilla.suse.com/546393"
},
{
"category": "external",
"summary": "SUSE Bug 566697 for CVE-2009-3607",
"url": "https://bugzilla.suse.com/566697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-3607"
},
{
"cve": "CVE-2009-3608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3608"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3608",
"url": "https://www.suse.com/security/cve/CVE-2009-3608"
},
{
"category": "external",
"summary": "SUSE Bug 543090 for CVE-2009-3608",
"url": "https://bugzilla.suse.com/543090"
},
{
"category": "external",
"summary": "SUSE Bug 543410 for CVE-2009-3608",
"url": "https://bugzilla.suse.com/543410"
},
{
"category": "external",
"summary": "SUSE Bug 546400 for CVE-2009-3608",
"url": "https://bugzilla.suse.com/546400"
},
{
"category": "external",
"summary": "SUSE Bug 546404 for CVE-2009-3608",
"url": "https://bugzilla.suse.com/546404"
},
{
"category": "external",
"summary": "SUSE Bug 556049 for CVE-2009-3608",
"url": "https://bugzilla.suse.com/556049"
},
{
"category": "external",
"summary": "SUSE Bug 566697 for CVE-2009-3608",
"url": "https://bugzilla.suse.com/566697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-3608"
},
{
"cve": "CVE-2013-1788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1788"
}
],
"notes": [
{
"category": "general",
"text": "poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an \"invalid memory access\" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1788",
"url": "https://www.suse.com/security/cve/CVE-2013-1788"
},
{
"category": "external",
"summary": "SUSE Bug 806793 for CVE-2013-1788",
"url": "https://bugzilla.suse.com/806793"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1788"
},
{
"cve": "CVE-2013-1789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1789"
}
],
"notes": [
{
"category": "general",
"text": "splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1789",
"url": "https://www.suse.com/security/cve/CVE-2013-1789"
},
{
"category": "external",
"summary": "SUSE Bug 806793 for CVE-2013-1789",
"url": "https://bugzilla.suse.com/806793"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1789"
},
{
"cve": "CVE-2013-1790",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1790"
}
],
"notes": [
{
"category": "general",
"text": "poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1790",
"url": "https://www.suse.com/security/cve/CVE-2013-1790"
},
{
"category": "external",
"summary": "SUSE Bug 806793 for CVE-2013-1790",
"url": "https://bugzilla.suse.com/806793"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1790"
},
{
"cve": "CVE-2013-4473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4473"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4473",
"url": "https://www.suse.com/security/cve/CVE-2013-4473"
},
{
"category": "external",
"summary": "SUSE Bug 847907 for CVE-2013-4473",
"url": "https://bugzilla.suse.com/847907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4473"
},
{
"cve": "CVE-2013-4474",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4474"
}
],
"notes": [
{
"category": "general",
"text": "Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4474",
"url": "https://www.suse.com/security/cve/CVE-2013-4474"
},
{
"category": "external",
"summary": "SUSE Bug 847907 for CVE-2013-4474",
"url": "https://bugzilla.suse.com/847907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-cpp0-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-glib8-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-4-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt4-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-1-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler-qt5-devel-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:libpoppler65-32bit-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:poppler-tools-0.49.0-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Poppler-0_18-0.49.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4474"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.