<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tiff</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1834-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-06-28T10:05:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-06-28T10:05:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-06-28T10:05:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tiff</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tiff fixes the following issues:

These security issues were fixed:

- CVE-2017-18013: There was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2018-10963: The TIFFWriteDirectorySec() function in tif_dirwrite.c allowed remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.  (bsc#1092949)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If the value of td_imagelength is set close to the amount of system memory, it will hang the system or trigger the OOM killer (bsc#1082332)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of TIFF images. A crafted TIFF document could have lead to a type confusion vulnerability resulting in remote code execution. This vulnerability could have been be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality (bsc#1007276)
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image (bsc#974621)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1834-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.0.9-31.1">
      <FullProductName ProductID="libtiff-devel-4.0.9-31.1">libtiff-devel-4.0.9-31.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-32bit-4.0.9-31.1">
      <FullProductName ProductID="libtiff-devel-32bit-4.0.9-31.1">libtiff-devel-32bit-4.0.9-31.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.0.9-31.1">
      <FullProductName ProductID="libtiff5-4.0.9-31.1">libtiff5-4.0.9-31.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.0.9-31.1">
      <FullProductName ProductID="libtiff5-32bit-4.0.9-31.1">libtiff5-32bit-4.0.9-31.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.0.9-31.1">
      <FullProductName ProductID="tiff-4.0.9-31.1">tiff-4.0.9-31.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff-devel-4.0.9-31.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1">libtiff-devel-4.0.9-31.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-32bit-4.0.9-31.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1">libtiff-devel-32bit-4.0.9-31.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.0.9-31.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libtiff5-4.0.9-31.1">libtiff5-4.0.9-31.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.0.9-31.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1">libtiff5-32bit-4.0.9-31.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.0.9-31.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:tiff-4.0.9-31.1">tiff-4.0.9-31.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2016-3632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3632.html</URL>
        <Description>CVE-2016-3632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974621</URL>
        <Description>SUSE Bug 974621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983436</URL>
        <Description>SUSE Bug 983436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.</Note>
    </Notes>
    <CVE>CVE-2016-8331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8331.html</URL>
        <Description>CVE-2016-8331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.</Note>
    </Notes>
    <CVE>CVE-2017-11613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11613.html</URL>
        <Description>CVE-2017-11613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082332</URL>
        <Description>SUSE Bug 1082332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106853</URL>
        <Description>SUSE Bug 1106853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a reachable assertion abort in the function TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.</Note>
    </Notes>
    <CVE>CVE-2017-13726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13726.html</URL>
        <Description>CVE-2017-13726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056176</URL>
        <Description>SUSE Bug 1056176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092949</URL>
        <Description>SUSE Bug 1092949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.</Note>
    </Notes>
    <CVE>CVE-2017-18013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18013.html</URL>
        <Description>CVE-2017-18013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074317</URL>
        <Description>SUSE Bug 1074317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082825</URL>
        <Description>SUSE Bug 1082825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.</Note>
    </Notes>
    <CVE>CVE-2018-10963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10963.html</URL>
        <Description>CVE-2018-10963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092949</URL>
        <Description>SUSE Bug 1092949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)</Note>
    </Notes>
    <CVE>CVE-2018-7456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7456.html</URL>
        <Description>CVE-2018-7456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074317</URL>
        <Description>SUSE Bug 1074317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082825</URL>
        <Description>SUSE Bug 1082825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.</Note>
    </Notes>
    <CVE>CVE-2018-8905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libtiff-devel-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff-devel-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-32bit-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libtiff5-4.0.9-31.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tiff-4.0.9-31.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8905.html</URL>
        <Description>CVE-2018-8905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086408</URL>
        <Description>SUSE Bug 1086408</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
