<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libmysofa</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0459-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-03-21T23:09:29Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-03-21T23:09:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-03-21T23:09:29Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libmysofa</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libmysofa fixes the following issues:

- Added security backports:
    gh#hoene/libmysofa#136 - CVE-2020-36152 - boo#1181977
    gh#hoene/libmysofa#138 - CVE-2020-36148 - boo#1181981
    gh#hoene/libmysofa#137 - CVE-2020-36149 - boo#1181980
    gh#hoene/libmysofa#134 - CVE-2020-36151 - boo#1181978
    gh#hoene/libmysofa#135 - CVE-2020-36150 - boo#1181979
    gh#hoene/libmysofa#96 - CVE-2020-6860 - boo#1182883

Update to version 0.9.1

  * Extended angular neighbor search to 'close the sphere'
  * Added and exposed mysofa_getfilter_float_nointerp method
  * Fixed various security issues
    CVE-2019-16091 - boo#1149919
    CVE-2019-16092 - boo#1149920
    CVE-2019-16093 - boo#1149922
    CVE-2019-16094 - boo#1149924
    CVE-2019-16095 - boo#1149926
    CVE-2019-20016 - boo#1159839
    CVE-2019-20063 - boo#1160040

This update was imported from the openSUSE:Leap:15.2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-459</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0459-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149919</URL>
      <Description>SUSE Bug 1149919</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149920</URL>
      <Description>SUSE Bug 1149920</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149922</URL>
      <Description>SUSE Bug 1149922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149924</URL>
      <Description>SUSE Bug 1149924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149926</URL>
      <Description>SUSE Bug 1149926</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159839</URL>
      <Description>SUSE Bug 1159839</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160040</URL>
      <Description>SUSE Bug 1160040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181977</URL>
      <Description>SUSE Bug 1181977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181978</URL>
      <Description>SUSE Bug 1181978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181979</URL>
      <Description>SUSE Bug 1181979</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181980</URL>
      <Description>SUSE Bug 1181980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181981</URL>
      <Description>SUSE Bug 1181981</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182883</URL>
      <Description>SUSE Bug 1182883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16091/</URL>
      <Description>SUSE CVE CVE-2019-16091 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16092/</URL>
      <Description>SUSE CVE CVE-2019-16092 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16093/</URL>
      <Description>SUSE CVE CVE-2019-16093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16094/</URL>
      <Description>SUSE CVE CVE-2019-16094 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16095/</URL>
      <Description>SUSE CVE CVE-2019-16095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20016/</URL>
      <Description>SUSE CVE CVE-2019-20016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20063/</URL>
      <Description>SUSE CVE CVE-2019-20063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36148/</URL>
      <Description>SUSE CVE CVE-2020-36148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36149/</URL>
      <Description>SUSE CVE CVE-2020-36149 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36150/</URL>
      <Description>SUSE CVE CVE-2020-36150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36151/</URL>
      <Description>SUSE CVE CVE-2020-36151 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36152/</URL>
      <Description>SUSE CVE CVE-2020-36152 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6860/</URL>
      <Description>SUSE CVE CVE-2020-6860 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP2">
        <FullProductName ProductID="SUSE Package Hub 15 SP2">SUSE Package Hub 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysofa-devel-0.9.1-bp152.4.3.1">
      <FullProductName ProductID="libmysofa-devel-0.9.1-bp152.4.3.1">libmysofa-devel-0.9.1-bp152.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysofa0-0.9.1-bp152.4.3.1">
      <FullProductName ProductID="libmysofa0-0.9.1-bp152.4.3.1">libmysofa0-0.9.1-bp152.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysofa0-64bit-0.9.1-bp152.4.3.1">
      <FullProductName ProductID="libmysofa0-64bit-0.9.1-bp152.4.3.1">libmysofa0-64bit-0.9.1-bp152.4.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysofa-devel-0.9.1-bp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1">libmysofa-devel-0.9.1-bp152.4.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysofa0-0.9.1-bp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1">libmysofa0-0.9.1-bp152.4.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysofa0-64bit-0.9.1-bp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1">libmysofa0-64bit-0.9.1-bp152.4.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Symonics libmysofa 0.7 has an out-of-bounds read in directblockRead in hdf/fractalhead.c.</Note>
    </Notes>
    <CVE>CVE-2019-16091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16091.html</URL>
        <Description>CVE-2019-16091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149919</URL>
        <Description>SUSE Bug 1149919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Symonics libmysofa 0.7 has a NULL pointer dereference in getHrtf in hrtf/reader.c.</Note>
    </Notes>
    <CVE>CVE-2019-16092</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16092.html</URL>
        <Description>CVE-2019-16092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149920</URL>
        <Description>SUSE Bug 1149920</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Symonics libmysofa 0.7 has an invalid write in readOHDRHeaderMessageDataLayout in hdf/dataobject.c.</Note>
    </Notes>
    <CVE>CVE-2019-16093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16093.html</URL>
        <Description>CVE-2019-16093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149922</URL>
        <Description>SUSE Bug 1149922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Symonics libmysofa 0.7 has an invalid read in readOHDRHeaderMessageDataLayout in hdf/dataobject.c.</Note>
    </Notes>
    <CVE>CVE-2019-16094</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16094.html</URL>
        <Description>CVE-2019-16094</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149924</URL>
        <Description>SUSE Bug 1149924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Symonics libmysofa 0.7 has an invalid read in getDimension in hrtf/reader.c.</Note>
    </Notes>
    <CVE>CVE-2019-16095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16095.html</URL>
        <Description>CVE-2019-16095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149926</URL>
        <Description>SUSE Bug 1149926</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.</Note>
    </Notes>
    <CVE>CVE-2019-20016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20016.html</URL>
        <Description>CVE-2019-20016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159839</URL>
        <Description>SUSE Bug 1159839</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hdf/dataobject.c in libmysofa before 0.8 has an uninitialized use of memory, as demonstrated by mysofa2json.</Note>
    </Notes>
    <CVE>CVE-2019-20063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20063.html</URL>
        <Description>CVE-2019-20063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160040</URL>
        <Description>SUSE Bug 1160040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of input data in verifyAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments).</Note>
    </Notes>
    <CVE>CVE-2020-36148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36148.html</URL>
        <Description>CVE-2020-36148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181981</URL>
        <Description>SUSE Bug 1181981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of input data in changeAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments).</Note>
    </Notes>
    <CVE>CVE-2020-36149</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36149.html</URL>
        <Description>CVE-2020-36149</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181980</URL>
        <Description>SUSE Bug 1181980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of input data in loudness function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and access to unallocated memory block.</Note>
    </Notes>
    <CVE>CVE-2020-36150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36150.html</URL>
        <Description>CVE-2020-36150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181979</URL>
        <Description>SUSE Bug 1181979</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of input data in mysofa_resampler_reset_mem function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and overwriting large memory block.</Note>
    </Notes>
    <CVE>CVE-2020-36151</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36151.html</URL>
        <Description>CVE-2020-36151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181978</URL>
        <Description>SUSE Bug 1181978</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in readDataVar in hdf/dataobject.c in Symonics libmysofa 0.5 - 1.1 allows attackers to execute arbitrary code via a crafted SOFA.</Note>
    </Notes>
    <CVE>CVE-2020-36152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36152.html</URL>
        <Description>CVE-2020-36152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181977</URL>
        <Description>SUSE Bug 1181977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libmysofa 0.9.1 has a stack-based buffer overflow in readDataVar in hdf/dataobject.c during the reading of a header message attribute.</Note>
    </Notes>
    <CVE>CVE-2020-6860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:libmysofa-devel-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-0.9.1-bp152.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:libmysofa0-64bit-0.9.1-bp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6860.html</URL>
        <Description>CVE-2020-6860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182883</URL>
        <Description>SUSE Bug 1182883</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
