<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for coredns</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:0319-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-27T14:01:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-27T14:01:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-27T14:01:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for coredns</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for coredns fixes the following issues:

Update to version 1.11.3:

  * optimize the performance for high qps (#6767)
  * bump deps
  * Fix zone parser error handling (#6680)
  * Add alternate option to forward plugin (#6681)
  * fix: plugin/file: return error when parsing the file fails (#6699)
  * [fix:documentation] Clarify autopath README (#6750)
  * Fix outdated test (#6747)
  * Bump go version from 1.21.8 to 1.21.11 (#6755)
  * Generate zplugin.go correctly with third-party plugins (#6692)
  * dnstap: uses pointer receiver for small response writer (#6644)
  * chore: fix function name in comment (#6608)
  * [plugin/forward] Strip local zone from IPV6 nameservers (#6635)
- fixes CVE-2023-30464
- fixes CVE-2023-28452

Update to upstream head (git commit #5a52707):

  * bump deps to address security issue CVE-2024-22189
  * Return RcodeServerFailure when DNS64 has no next plugin (#6590)
  * add plusserver to adopters (#6565)
  * Change the log flags to be a variable that can be set prior to calling Run (#6546)
  * Enable Prometheus native histograms (#6524)
  * forward: respect context (#6483)
  * add client labels to k8s plugin metadata (#6475)
  * fix broken link in webpage (#6488)
  * Repo controlled Go version (#6526)
  * removed the mutex locks with atomic bool (#6525)

Update to version 1.11.2:

  * rewrite: fix multi request concurrency issue in cname rewrite  (#6407)
  * plugin/tls: respect the path specified by root plugin (#6138)
  * plugin/auto: warn when auto is unable to read elements of the directory tree (#6333)
  * fix: make the codeowners link relative (#6397)
  * plugin/etcd: the etcd client adds the DialKeepAliveTime parameter (#6351)
  * plugin/cache: key cache on Checking Disabled (CD) bit (#6354)
  * Use the correct root domain name in the proxy plugin's TestHealthX tests (#6395)
  * Add PITS Global Data Recovery Services as an adopter (#6304)
  * Handle UDP responses that overflow with TC bit with test case (#6277)
  * plugin/rewrite: add rcode as a rewrite option (#6204)

- CVE-2024-0874: coredns: CD bit response is cached and served later

- Update to version 1.11.1:

  * Revert “plugin/forward: Continue waiting after receiving malformed responses
  * plugin/dnstap: add support for “extra” field in payload
  * plugin/cache: fix keepttl parsing

- Update to version 1.11.0:

  * Adds support for accepting DNS connections over QUIC (doq).
  * Adds CNAME target rewrites to the rewrite plugin.
  * Plus many bug fixes, and some security improvements.
  * This release introduces the following backward incompatible changes:
   + In the kubernetes plugin, we have dropped support for watching Endpoint and Endpointslice v1beta, 
     since all supported K8s versions now use Endpointslice.
   + The bufsize plugin changed its default size limit value to 1232
   + Some changes to forward plugin metrics.

- Update to version 1.10.1:

  * Corrected architecture labels in multi-arch image manifest
  * A new plugin timeouts that allows configuration of server listener timeout durations
  * acl can drop queries as an action
  * template supports creating responses with extended DNS errors
  * New weighted policy in loadbalance
  * Option to serve original record TTLs from cache

- Update to version 1.10.0:

	* core: add log listeners for k8s_event plugin (#5451)
	* core: log DoH HTTP server error logs in CoreDNS format (#5457)
	* core: warn when domain names are not in RFC1035 preferred syntax (#5414)
	* plugin/acl: add support for extended DNS errors (#5532)
	* plugin/bufsize: do not expand query UDP buffer size if already set to a smaller value (#5602)
	* plugin/cache: add cache disable option (#5540)
	* plugin/cache: add metadata for wildcard record responses (#5308)
	* plugin/cache: add option to adjust SERVFAIL response cache TTL (#5320)
	* plugin/cache: correct responses to Authenticated Data requests (#5191)
	* plugin/dnstap: add identity and version support for the dnstap plugin (#5555)
	* plugin/file: add metadata for wildcard record responses (#5308)
	* plugin/forward: enable multiple forward declarations (#5127)
	* plugin/forward: health_check needs to normalize a specified domain name (#5543)
	* plugin/forward: remove unused coredns_forward_sockets_open metric (#5431)
	* plugin/header: add support for query modification (#5556)
	* plugin/health: bypass proxy in self health check (#5401)
	* plugin/health: don't go lameduck when reloading (#5472)
	* plugin/k8s_external: add support for PTR requests (#5435)
	* plugin/k8s_external: resolve headless services (#5505)
	* plugin/kubernetes: make kubernetes client log in CoreDNS format (#5461)
	* plugin/ready: reset list of readiness plugins on startup (#5492)
	* plugin/rewrite: add PTR records to supported types (#5565)
	* plugin/rewrite: fix a crash in rewrite plugin when rule type is missing (#5459)
	* plugin/rewrite: fix out-of-index issue in rewrite plugin (#5462)
	* plugin/rewrite: support min and max TTL values (#5508)
	* plugin/trace : make zipkin HTTP reporter more configurable using Corefile (#5460)
	* plugin/trace: read trace context info from headers for DOH (#5439)
	* plugin/tsig: add new plugin TSIG for validating TSIG requests and signing responses (#4957)
	* core: update gopkg.in/yaml.v3 to fix CVE-2022-28948 
	* core: update golang.org/x/crypto to fix CVE-2022-27191 
	* plugin/acl: adding a check to parse out zone info 
	* plugin/dnstap: support FQDN TCP endpoint 
	* plugin/errors: add stacktrace option to log a stacktrace during panic recovery 
	* plugin/template: return SERVFAIL for zone-match regex-no-match case 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2024-319</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:0319-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-27191/</URL>
      <Description>SUSE CVE CVE-2022-27191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-28948/</URL>
      <Description>SUSE CVE CVE-2022-28948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28452/</URL>
      <Description>SUSE CVE CVE-2023-28452 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-30464/</URL>
      <Description>SUSE CVE CVE-2023-30464 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0874/</URL>
      <Description>SUSE CVE CVE-2024-0874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22189/</URL>
      <Description>SUSE CVE CVE-2024-22189 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Package Hub 15 SP6">SUSE Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="coredns-1.11.3-bp156.4.3.1">
      <FullProductName ProductID="coredns-1.11.3-bp156.4.3.1">coredns-1.11.3-bp156.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="coredns-extras-1.11.3-bp156.4.3.1">
      <FullProductName ProductID="coredns-extras-1.11.3-bp156.4.3.1">coredns-extras-1.11.3-bp156.4.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="coredns-1.11.3-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1">coredns-1.11.3-bp156.4.3.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="coredns-extras-1.11.3-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1">coredns-extras-1.11.3-bp156.4.3.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="coredns-1.11.3-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1">coredns-1.11.3-bp156.4.3.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="coredns-extras-1.11.3-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1">coredns-extras-1.11.3-bp156.4.3.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.</Note>
    </Notes>
    <CVE>CVE-2022-27191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-27191.html</URL>
        <Description>CVE-2022-27191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197284</URL>
        <Description>SUSE Bug 1197284</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.</Note>
    </Notes>
    <CVE>CVE-2022-28948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-28948.html</URL>
        <Description>CVE-2022-28948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199772</URL>
        <Description>SUSE Bug 1199772</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.</Note>
    </Notes>
    <CVE>CVE-2023-28452</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28452.html</URL>
        <Description>CVE-2023-28452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230760</URL>
        <Description>SUSE Bug 1230760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.</Note>
    </Notes>
    <CVE>CVE-2023-30464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-30464.html</URL>
        <Description>CVE-2023-30464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230757</URL>
        <Description>SUSE Bug 1230757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.</Note>
    </Notes>
    <CVE>CVE-2024-0874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0874.html</URL>
        <Description>CVE-2024-0874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219167</URL>
        <Description>SUSE Bug 1219167</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.</Note>
    </Notes>
    <CVE>CVE-2024-22189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22189.html</URL>
        <Description>CVE-2024-22189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222461</URL>
        <Description>SUSE Bug 1222461</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
