<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libtiff-devel-32bit-4.3.0-1.6 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12057</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libtiff-devel-32bit-4.3.0-1.6 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libtiff-devel-32bit-4.3.0-1.6 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12057</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:12057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0561/</URL>
      <Description>SUSE CVE CVE-2022-0561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0562/</URL>
      <Description>SUSE CVE CVE-2022-0562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0865/</URL>
      <Description>SUSE CVE CVE-2022-0865 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0891/</URL>
      <Description>SUSE CVE CVE-2022-0891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0907/</URL>
      <Description>SUSE CVE CVE-2022-0907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0908/</URL>
      <Description>SUSE CVE CVE-2022-0908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0909/</URL>
      <Description>SUSE CVE CVE-2022-0909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0924/</URL>
      <Description>SUSE CVE CVE-2022-0924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1056/</URL>
      <Description>SUSE CVE CVE-2022-1056 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.3.0-2.1">
      <FullProductName ProductID="libtiff-devel-4.3.0-2.1">libtiff-devel-4.3.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-32bit-4.3.0-1.6">
      <FullProductName ProductID="libtiff-devel-32bit-4.3.0-1.6">libtiff-devel-32bit-4.3.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.3.0-2.1">
      <FullProductName ProductID="libtiff5-4.3.0-2.1">libtiff5-4.3.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.3.0-1.6">
      <FullProductName ProductID="libtiff5-32bit-4.3.0-1.6">libtiff5-32bit-4.3.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.3.0-2.1">
      <FullProductName ProductID="tiff-4.3.0-2.1">tiff-4.3.0-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff-devel-4.3.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1">libtiff-devel-4.3.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-32bit-4.3.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6">libtiff-devel-32bit-4.3.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.3.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-4.3.0-2.1">libtiff5-4.3.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.3.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6">libtiff5-32bit-4.3.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.3.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tiff-4.3.0-2.1">tiff-4.3.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.</Note>
    </Notes>
    <CVE>CVE-2022-0561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0561.html</URL>
        <Description>CVE-2022-0561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195964</URL>
        <Description>SUSE Bug 1195964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.</Note>
    </Notes>
    <CVE>CVE-2022-0562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0562.html</URL>
        <Description>CVE-2022-0562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195965</URL>
        <Description>SUSE Bug 1195965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201723</URL>
        <Description>SUSE Bug 1201723</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.</Note>
    </Notes>
    <CVE>CVE-2022-0865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0865.html</URL>
        <Description>CVE-2022-0865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197066</URL>
        <Description>SUSE Bug 1197066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact</Note>
    </Notes>
    <CVE>CVE-2022-0891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0891.html</URL>
        <Description>CVE-2022-0891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197068</URL>
        <Description>SUSE Bug 1197068</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.</Note>
    </Notes>
    <CVE>CVE-2022-0907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0907.html</URL>
        <Description>CVE-2022-0907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197070</URL>
        <Description>SUSE Bug 1197070</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.</Note>
    </Notes>
    <CVE>CVE-2022-0908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0908.html</URL>
        <Description>CVE-2022-0908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197074</URL>
        <Description>SUSE Bug 1197074</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.</Note>
    </Notes>
    <CVE>CVE-2022-0909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0909.html</URL>
        <Description>CVE-2022-0909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197072</URL>
        <Description>SUSE Bug 1197072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.</Note>
    </Notes>
    <CVE>CVE-2022-0924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0924.html</URL>
        <Description>CVE-2022-0924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197073</URL>
        <Description>SUSE Bug 1197073</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.</Note>
    </Notes>
    <CVE>CVE-2022-1056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1056.html</URL>
        <Description>CVE-2022-1056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197631</URL>
        <Description>SUSE Bug 1197631</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
