<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:2756-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-10-18T11:46:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-10-18T11:46:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-10-18T11:46:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes several issues.

These security issues were fixed:
    
- CVE-2017-9798: Prevent use-after-free use of memory that allowed for an
  information leak via OPTIONS (bsc#1058058)
- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest could have
  lead to leakage of potentially confidential information, and a segfault in
  other cases resulting in DoS (bsc#1048576).
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer
  when sending a malicious Content-Type response header (bsc#1045060).
- CVE-2017-3169: mod_ssl may dereferenced a NULL pointer when third-party
  modules call ap_hook_process_connection() during an HTTP request to an HTTPS
  port allowing for DoS (bsc#1045062).
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules
  outside of the authentication phase may have lead to authentication
  requirements being bypassed (bsc#1045065).

These non-security issues were fixed:

- remove /usr/bin/http2 symlink only during apache2 package 
  uninstall, not upgrade (bsc#1041830)
- gensslcert: use hostname when fqdn is too long (bsc#1035829)
- add NotifyAccess=all to service file (bsc#980663)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SERVER-12-2017-1709</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/</URL>
      <Description>Link for SUSE-SU-2017:2756-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:2756-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1035829</URL>
      <Description>SUSE Bug 1035829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1041830</URL>
      <Description>SUSE Bug 1041830</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1045060</URL>
      <Description>SUSE Bug 1045060</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1045062</URL>
      <Description>SUSE Bug 1045062</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1045065</URL>
      <Description>SUSE Bug 1045065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1048576</URL>
      <Description>SUSE Bug 1048576</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1058058</URL>
      <Description>SUSE Bug 1058058</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/980663</URL>
      <Description>SUSE Bug 980663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3167/</URL>
      <Description>SUSE CVE CVE-2017-3167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3169/</URL>
      <Description>SUSE CVE CVE-2017-3169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7679/</URL>
      <Description>SUSE CVE CVE-2017-7679 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9788/</URL>
      <Description>SUSE CVE CVE-2017-9788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9798/</URL>
      <Description>SUSE CVE CVE-2017-9798 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.10-14.28.1">
      <FullProductName ProductID="apache2-2.4.10-14.28.1">apache2-2.4.10-14.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.10-14.28.1">
      <FullProductName ProductID="apache2-doc-2.4.10-14.28.1">apache2-doc-2.4.10-14.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.10-14.28.1">
      <FullProductName ProductID="apache2-example-pages-2.4.10-14.28.1">apache2-example-pages-2.4.10-14.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.10-14.28.1">
      <FullProductName ProductID="apache2-prefork-2.4.10-14.28.1">apache2-prefork-2.4.10-14.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.10-14.28.1">
      <FullProductName ProductID="apache2-utils-2.4.10-14.28.1">apache2-utils-2.4.10-14.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.10-14.28.1">
      <FullProductName ProductID="apache2-worker-2.4.10-14.28.1">apache2-worker-2.4.10-14.28.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.10-14.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1">apache2-2.4.10-14.28.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.10-14.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1">apache2-doc-2.4.10-14.28.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.10-14.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1">apache2-example-pages-2.4.10-14.28.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.10-14.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1">apache2-prefork-2.4.10-14.28.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.10-14.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1">apache2-utils-2.4.10-14.28.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.10-14.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1">apache2-worker-2.4.10-14.28.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.</Note>
    </Notes>
    <CVE>CVE-2017-3167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3167.html</URL>
        <Description>CVE-2017-3167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045065</URL>
        <Description>SUSE Bug 1045065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078450</URL>
        <Description>SUSE Bug 1078450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.</Note>
    </Notes>
    <CVE>CVE-2017-3169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3169.html</URL>
        <Description>CVE-2017-3169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045062</URL>
        <Description>SUSE Bug 1045062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078450</URL>
        <Description>SUSE Bug 1078450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.</Note>
    </Notes>
    <CVE>CVE-2017-7679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7679.html</URL>
        <Description>CVE-2017-7679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045060</URL>
        <Description>SUSE Bug 1045060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057861</URL>
        <Description>SUSE Bug 1057861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078450</URL>
        <Description>SUSE Bug 1078450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-9788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9788.html</URL>
        <Description>CVE-2017-9788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048576</URL>
        <Description>SUSE Bug 1048576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.</Note>
    </Notes>
    <CVE>CVE-2017-9798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9798.html</URL>
        <Description>CVE-2017-9798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058058</URL>
        <Description>SUSE Bug 1058058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1060757</URL>
        <Description>SUSE Bug 1060757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077582</URL>
        <Description>SUSE Bug 1077582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078450</URL>
        <Description>SUSE Bug 1078450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089997</URL>
        <Description>SUSE Bug 1089997</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
