<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libssh2_org</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1075-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-28T16:32:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-28T16:32:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-28T16:32:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libssh2_org</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 
This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1075-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libssh2-1-1.4.3-19.3.1">
      <FullProductName ProductID="libssh2-1-1.4.3-19.3.1">libssh2-1-1.4.3-19.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh2-1-32bit-1.4.3-19.3.1">
      <FullProductName ProductID="libssh2-1-32bit-1.4.3-19.3.1">libssh2-1-32bit-1.4.3-19.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh2-devel-1.4.3-19.3.1">
      <FullProductName ProductID="libssh2-devel-1.4.3-19.3.1">libssh2-devel-1.4.3-19.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh2_org-1.4.3-19.3.1">
      <FullProductName ProductID="libssh2_org-1.4.3-19.3.1">libssh2_org-1.4.3-19.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libssh2-1-1.4.3-19.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1">libssh2-1-1.4.3-19.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh2-1-32bit-1.4.3-19.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1">libssh2-1-32bit-1.4.3-19.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh2-devel-1.4.3-19.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1">libssh2-devel-1.4.3-19.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh2_org-1.4.3-19.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1">libssh2_org-1.4.3-19.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-3855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3855.html</URL>
        <Description>CVE-2019-3855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128471</URL>
        <Description>SUSE Bug 1128471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134329</URL>
        <Description>SUSE Bug 1134329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141850</URL>
        <Description>SUSE Bug 1141850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-3856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3856.html</URL>
        <Description>CVE-2019-3856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128472</URL>
        <Description>SUSE Bug 1128472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-3857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3857.html</URL>
        <Description>CVE-2019-3857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128474</URL>
        <Description>SUSE Bug 1128474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3858.html</URL>
        <Description>CVE-2019-3858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128476</URL>
        <Description>SUSE Bug 1128476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3859.html</URL>
        <Description>CVE-2019-3859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128480</URL>
        <Description>SUSE Bug 1128480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130103</URL>
        <Description>SUSE Bug 1130103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3860.html</URL>
        <Description>CVE-2019-3860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128481</URL>
        <Description>SUSE Bug 1128481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136570</URL>
        <Description>SUSE Bug 1136570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3861.html</URL>
        <Description>CVE-2019-3861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128490</URL>
        <Description>SUSE Bug 1128490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3862.html</URL>
        <Description>CVE-2019-3862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128492</URL>
        <Description>SUSE Bug 1128492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.</Note>
    </Notes>
    <CVE>CVE-2019-3863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libssh2-1-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-1-32bit-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2-devel-1.4.3-19.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libssh2_org-1.4.3-19.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3863.html</URL>
        <Description>CVE-2019-3863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128493</URL>
        <Description>SUSE Bug 1128493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130103</URL>
        <Description>SUSE Bug 1130103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
