{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"tcpdump-4.99.1-1.2 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the tcpdump-4.99.1-1.2 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-11425","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11425-1.json"},{"category":"self","summary":"SUSE CVE CVE-2016-7922 page","url":"https://www.suse.com/security/cve/CVE-2016-7922/"},{"category":"self","summary":"SUSE CVE CVE-2016-7923 page","url":"https://www.suse.com/security/cve/CVE-2016-7923/"},{"category":"self","summary":"SUSE CVE CVE-2016-7924 page","url":"https://www.suse.com/security/cve/CVE-2016-7924/"},{"category":"self","summary":"SUSE CVE CVE-2016-7925 page","url":"https://www.suse.com/security/cve/CVE-2016-7925/"},{"category":"self","summary":"SUSE CVE CVE-2016-7926 page","url":"https://www.suse.com/security/cve/CVE-2016-7926/"},{"category":"self","summary":"SUSE CVE CVE-2016-7927 page","url":"https://www.suse.com/security/cve/CVE-2016-7927/"},{"category":"self","summary":"SUSE CVE CVE-2016-7928 page","url":"https://www.suse.com/security/cve/CVE-2016-7928/"},{"category":"self","summary":"SUSE CVE CVE-2016-7929 page","url":"https://www.suse.com/security/cve/CVE-2016-7929/"},{"category":"self","summary":"SUSE CVE CVE-2016-7930 page","url":"https://www.suse.com/security/cve/CVE-2016-7930/"},{"category":"self","summary":"SUSE CVE CVE-2016-7931 page","url":"https://www.suse.com/security/cve/CVE-2016-7931/"},{"category":"self","summary":"SUSE CVE CVE-2016-7932 page","url":"https://www.suse.com/security/cve/CVE-2016-7932/"},{"category":"self","summary":"SUSE CVE CVE-2016-7933 page","url":"https://www.suse.com/security/cve/CVE-2016-7933/"},{"category":"self","summary":"SUSE CVE CVE-2016-7934 page","url":"https://www.suse.com/security/cve/CVE-2016-7934/"},{"category":"self","summary":"SUSE CVE CVE-2016-7935 page","url":"https://www.suse.com/security/cve/CVE-2016-7935/"},{"category":"self","summary":"SUSE CVE CVE-2016-7936 page","url":"https://www.suse.com/security/cve/CVE-2016-7936/"},{"category":"self","summary":"SUSE CVE CVE-2016-7937 page","url":"https://www.suse.com/security/cve/CVE-2016-7937/"},{"category":"self","summary":"SUSE CVE CVE-2016-7938 page","url":"https://www.suse.com/security/cve/CVE-2016-7938/"},{"category":"self","summary":"SUSE CVE CVE-2016-7939 page","url":"https://www.suse.com/security/cve/CVE-2016-7939/"},{"category":"self","summary":"SUSE CVE CVE-2016-7940 page","url":"https://www.suse.com/security/cve/CVE-2016-7940/"},{"category":"self","summary":"SUSE CVE CVE-2016-7973 page","url":"https://www.suse.com/security/cve/CVE-2016-7973/"},{"category":"self","summary":"SUSE CVE CVE-2016-7974 page","url":"https://www.suse.com/security/cve/CVE-2016-7974/"},{"category":"self","summary":"SUSE CVE CVE-2016-7975 page","url":"https://www.suse.com/security/cve/CVE-2016-7975/"},{"category":"self","summary":"SUSE CVE CVE-2016-7983 page","url":"https://www.suse.com/security/cve/CVE-2016-7983/"},{"category":"self","summary":"SUSE CVE CVE-2016-7984 page","url":"https://www.suse.com/security/cve/CVE-2016-7984/"},{"category":"self","summary":"SUSE CVE CVE-2016-7985 page","url":"https://www.suse.com/security/cve/CVE-2016-7985/"},{"category":"self","summary":"SUSE CVE CVE-2016-7986 page","url":"https://www.suse.com/security/cve/CVE-2016-7986/"},{"category":"self","summary":"SUSE CVE CVE-2016-7992 page","url":"https://www.suse.com/security/cve/CVE-2016-7992/"},{"category":"self","summary":"SUSE CVE CVE-2016-7993 page","url":"https://www.suse.com/security/cve/CVE-2016-7993/"},{"category":"self","summary":"SUSE CVE CVE-2016-8574 page","url":"https://www.suse.com/security/cve/CVE-2016-8574/"},{"category":"self","summary":"SUSE CVE CVE-2016-8575 page","url":"https://www.suse.com/security/cve/CVE-2016-8575/"},{"category":"self","summary":"SUSE CVE CVE-2017-11108 page","url":"https://www.suse.com/security/cve/CVE-2017-11108/"},{"category":"self","summary":"SUSE CVE CVE-2017-11541 page","url":"https://www.suse.com/security/cve/CVE-2017-11541/"},{"category":"self","summary":"SUSE CVE CVE-2017-11542 page","url":"https://www.suse.com/security/cve/CVE-2017-11542/"},{"category":"self","summary":"SUSE CVE CVE-2017-11543 page","url":"https://www.suse.com/security/cve/CVE-2017-11543/"},{"category":"self","summary":"SUSE CVE CVE-2017-12893 page","url":"https://www.suse.com/security/cve/CVE-2017-12893/"},{"category":"self","summary":"SUSE CVE CVE-2017-12894 page","url":"https://www.suse.com/security/cve/CVE-2017-12894/"},{"category":"self","summary":"SUSE CVE CVE-2017-12895 page","url":"https://www.suse.com/security/cve/CVE-2017-12895/"},{"category":"self","summary":"SUSE CVE CVE-2017-12896 page","url":"https://www.suse.com/security/cve/CVE-2017-12896/"},{"category":"self","summary":"SUSE CVE CVE-2017-12897 page","url":"https://www.suse.com/security/cve/CVE-2017-12897/"},{"category":"self","summary":"SUSE CVE CVE-2017-12898 page","url":"https://www.suse.com/security/cve/CVE-2017-12898/"},{"category":"self","summary":"SUSE CVE CVE-2017-12899 page","url":"https://www.suse.com/security/cve/CVE-2017-12899/"},{"category":"self","summary":"SUSE CVE CVE-2017-12900 page","url":"https://www.suse.com/security/cve/CVE-2017-12900/"},{"category":"self","summary":"SUSE CVE CVE-2017-12901 page","url":"https://www.suse.com/security/cve/CVE-2017-12901/"},{"category":"self","summary":"SUSE CVE CVE-2017-12902 page","url":"https://www.suse.com/security/cve/CVE-2017-12902/"},{"category":"self","summary":"SUSE CVE CVE-2017-12985 page","url":"https://www.suse.com/security/cve/CVE-2017-12985/"},{"category":"self","summary":"SUSE CVE CVE-2017-12986 page","url":"https://www.suse.com/security/cve/CVE-2017-12986/"},{"category":"self","summary":"SUSE CVE CVE-2017-12987 page","url":"https://www.suse.com/security/cve/CVE-2017-12987/"},{"category":"self","summary":"SUSE CVE CVE-2017-12988 page","url":"https://www.suse.com/security/cve/CVE-2017-12988/"},{"category":"self","summary":"SUSE CVE CVE-2017-12989 page","url":"https://www.suse.com/security/cve/CVE-2017-12989/"},{"category":"self","summary":"SUSE CVE CVE-2017-12990 page","url":"https://www.suse.com/security/cve/CVE-2017-12990/"},{"category":"self","summary":"SUSE CVE CVE-2017-12991 page","url":"https://www.suse.com/security/cve/CVE-2017-12991/"},{"category":"self","summary":"SUSE CVE CVE-2017-12992 page","url":"https://www.suse.com/security/cve/CVE-2017-12992/"},{"category":"self","summary":"SUSE CVE CVE-2017-12993 page","url":"https://www.suse.com/security/cve/CVE-2017-12993/"},{"category":"self","summary":"SUSE CVE CVE-2017-12994 page","url":"https://www.suse.com/security/cve/CVE-2017-12994/"},{"category":"self","summary":"SUSE CVE CVE-2017-12995 page","url":"https://www.suse.com/security/cve/CVE-2017-12995/"},{"category":"self","summary":"SUSE CVE CVE-2017-12996 page","url":"https://www.suse.com/security/cve/CVE-2017-12996/"},{"category":"self","summary":"SUSE CVE CVE-2017-12997 page","url":"https://www.suse.com/security/cve/CVE-2017-12997/"},{"category":"self","summary":"SUSE CVE CVE-2017-12998 page","url":"https://www.suse.com/security/cve/CVE-2017-12998/"},{"category":"self","summary":"SUSE CVE CVE-2017-12999 page","url":"https://www.suse.com/security/cve/CVE-2017-12999/"},{"category":"self","summary":"SUSE CVE CVE-2017-13000 page","url":"https://www.suse.com/security/cve/CVE-2017-13000/"},{"category":"self","summary":"SUSE CVE CVE-2017-13001 page","url":"https://www.suse.com/security/cve/CVE-2017-13001/"},{"category":"self","summary":"SUSE CVE CVE-2017-13002 page","url":"https://www.suse.com/security/cve/CVE-2017-13002/"},{"category":"self","summary":"SUSE CVE CVE-2017-13003 page","url":"https://www.suse.com/security/cve/CVE-2017-13003/"},{"category":"self","summary":"SUSE CVE CVE-2017-13004 page","url":"https://www.suse.com/security/cve/CVE-2017-13004/"},{"category":"self","summary":"SUSE CVE CVE-2017-13005 page","url":"https://www.suse.com/security/cve/CVE-2017-13005/"},{"category":"self","summary":"SUSE CVE CVE-2017-13006 page","url":"https://www.suse.com/security/cve/CVE-2017-13006/"},{"category":"self","summary":"SUSE CVE CVE-2017-13007 page","url":"https://www.suse.com/security/cve/CVE-2017-13007/"},{"category":"self","summary":"SUSE CVE CVE-2017-13008 page","url":"https://www.suse.com/security/cve/CVE-2017-13008/"},{"category":"self","summary":"SUSE CVE CVE-2017-13009 page","url":"https://www.suse.com/security/cve/CVE-2017-13009/"},{"category":"self","summary":"SUSE CVE CVE-2017-13010 page","url":"https://www.suse.com/security/cve/CVE-2017-13010/"},{"category":"self","summary":"SUSE CVE CVE-2017-13011 page","url":"https://www.suse.com/security/cve/CVE-2017-13011/"},{"category":"self","summary":"SUSE CVE CVE-2017-13012 page","url":"https://www.suse.com/security/cve/CVE-2017-13012/"},{"category":"self","summary":"SUSE CVE CVE-2017-13013 page","url":"https://www.suse.com/security/cve/CVE-2017-13013/"},{"category":"self","summary":"SUSE CVE CVE-2017-13014 page","url":"https://www.suse.com/security/cve/CVE-2017-13014/"},{"category":"self","summary":"SUSE CVE CVE-2017-13015 page","url":"https://www.suse.com/security/cve/CVE-2017-13015/"},{"category":"self","summary":"SUSE CVE CVE-2017-13016 page","url":"https://www.suse.com/security/cve/CVE-2017-13016/"},{"category":"self","summary":"SUSE CVE CVE-2017-13017 page","url":"https://www.suse.com/security/cve/CVE-2017-13017/"},{"category":"self","summary":"SUSE CVE CVE-2017-13018 page","url":"https://www.suse.com/security/cve/CVE-2017-13018/"},{"category":"self","summary":"SUSE CVE CVE-2017-13019 page","url":"https://www.suse.com/security/cve/CVE-2017-13019/"},{"category":"self","summary":"SUSE CVE CVE-2017-13020 page","url":"https://www.suse.com/security/cve/CVE-2017-13020/"},{"category":"self","summary":"SUSE CVE CVE-2017-13021 page","url":"https://www.suse.com/security/cve/CVE-2017-13021/"},{"category":"self","summary":"SUSE CVE CVE-2017-13022 page","url":"https://www.suse.com/security/cve/CVE-2017-13022/"},{"category":"self","summary":"SUSE CVE CVE-2017-13023 page","url":"https://www.suse.com/security/cve/CVE-2017-13023/"},{"category":"self","summary":"SUSE CVE CVE-2017-13024 page","url":"https://www.suse.com/security/cve/CVE-2017-13024/"},{"category":"self","summary":"SUSE CVE CVE-2017-13025 page","url":"https://www.suse.com/security/cve/CVE-2017-13025/"},{"category":"self","summary":"SUSE CVE CVE-2017-13026 page","url":"https://www.suse.com/security/cve/CVE-2017-13026/"},{"category":"self","summary":"SUSE CVE CVE-2017-13027 page","url":"https://www.suse.com/security/cve/CVE-2017-13027/"},{"category":"self","summary":"SUSE CVE CVE-2017-13028 page","url":"https://www.suse.com/security/cve/CVE-2017-13028/"},{"category":"self","summary":"SUSE CVE CVE-2017-13029 page","url":"https://www.suse.com/security/cve/CVE-2017-13029/"},{"category":"self","summary":"SUSE CVE CVE-2017-13030 page","url":"https://www.suse.com/security/cve/CVE-2017-13030/"},{"category":"self","summary":"SUSE CVE CVE-2017-13031 page","url":"https://www.suse.com/security/cve/CVE-2017-13031/"},{"category":"self","summary":"SUSE CVE CVE-2017-13032 page","url":"https://www.suse.com/security/cve/CVE-2017-13032/"},{"category":"self","summary":"SUSE CVE CVE-2017-13033 page","url":"https://www.suse.com/security/cve/CVE-2017-13033/"},{"category":"self","summary":"SUSE CVE CVE-2017-13034 page","url":"https://www.suse.com/security/cve/CVE-2017-13034/"},{"category":"self","summary":"SUSE CVE CVE-2017-13035 page","url":"https://www.suse.com/security/cve/CVE-2017-13035/"},{"category":"self","summary":"SUSE CVE CVE-2017-13036 page","url":"https://www.suse.com/security/cve/CVE-2017-13036/"},{"category":"self","summary":"SUSE CVE CVE-2017-13037 page","url":"https://www.suse.com/security/cve/CVE-2017-13037/"},{"category":"self","summary":"SUSE CVE CVE-2017-13038 page","url":"https://www.suse.com/security/cve/CVE-2017-13038/"},{"category":"self","summary":"SUSE CVE CVE-2017-13039 page","url":"https://www.suse.com/security/cve/CVE-2017-13039/"},{"category":"self","summary":"SUSE CVE CVE-2017-13040 page","url":"https://www.suse.com/security/cve/CVE-2017-13040/"},{"category":"self","summary":"SUSE CVE CVE-2017-13041 page","url":"https://www.suse.com/security/cve/CVE-2017-13041/"},{"category":"self","summary":"SUSE CVE CVE-2017-13042 page","url":"https://www.suse.com/security/cve/CVE-2017-13042/"},{"category":"self","summary":"SUSE CVE CVE-2017-13043 page","url":"https://www.suse.com/security/cve/CVE-2017-13043/"},{"category":"self","summary":"SUSE CVE CVE-2017-13044 page","url":"https://www.suse.com/security/cve/CVE-2017-13044/"},{"category":"self","summary":"SUSE CVE CVE-2017-13045 page","url":"https://www.suse.com/security/cve/CVE-2017-13045/"},{"category":"self","summary":"SUSE CVE CVE-2017-13046 page","url":"https://www.suse.com/security/cve/CVE-2017-13046/"},{"category":"self","summary":"SUSE CVE CVE-2017-13047 page","url":"https://www.suse.com/security/cve/CVE-2017-13047/"},{"category":"self","summary":"SUSE CVE CVE-2017-13048 page","url":"https://www.suse.com/security/cve/CVE-2017-13048/"},{"category":"self","summary":"SUSE CVE CVE-2017-13049 page","url":"https://www.suse.com/security/cve/CVE-2017-13049/"},{"category":"self","summary":"SUSE CVE CVE-2017-13050 page","url":"https://www.suse.com/security/cve/CVE-2017-13050/"},{"category":"self","summary":"SUSE CVE CVE-2017-13051 page","url":"https://www.suse.com/security/cve/CVE-2017-13051/"},{"category":"self","summary":"SUSE CVE CVE-2017-13052 page","url":"https://www.suse.com/security/cve/CVE-2017-13052/"},{"category":"self","summary":"SUSE CVE CVE-2017-13053 page","url":"https://www.suse.com/security/cve/CVE-2017-13053/"},{"category":"self","summary":"SUSE CVE CVE-2017-13054 page","url":"https://www.suse.com/security/cve/CVE-2017-13054/"},{"category":"self","summary":"SUSE CVE CVE-2017-13055 page","url":"https://www.suse.com/security/cve/CVE-2017-13055/"},{"category":"self","summary":"SUSE CVE CVE-2017-13687 page","url":"https://www.suse.com/security/cve/CVE-2017-13687/"},{"category":"self","summary":"SUSE CVE CVE-2017-13688 page","url":"https://www.suse.com/security/cve/CVE-2017-13688/"},{"category":"self","summary":"SUSE CVE CVE-2017-13689 page","url":"https://www.suse.com/security/cve/CVE-2017-13689/"},{"category":"self","summary":"SUSE CVE CVE-2017-13690 page","url":"https://www.suse.com/security/cve/CVE-2017-13690/"},{"category":"self","summary":"SUSE CVE CVE-2017-13725 page","url":"https://www.suse.com/security/cve/CVE-2017-13725/"},{"category":"self","summary":"SUSE CVE CVE-2017-16808 page","url":"https://www.suse.com/security/cve/CVE-2017-16808/"},{"category":"self","summary":"SUSE CVE CVE-2017-5202 page","url":"https://www.suse.com/security/cve/CVE-2017-5202/"},{"category":"self","summary":"SUSE CVE CVE-2017-5203 page","url":"https://www.suse.com/security/cve/CVE-2017-5203/"},{"category":"self","summary":"SUSE CVE CVE-2017-5204 page","url":"https://www.suse.com/security/cve/CVE-2017-5204/"},{"category":"self","summary":"SUSE CVE CVE-2017-5205 page","url":"https://www.suse.com/security/cve/CVE-2017-5205/"},{"category":"self","summary":"SUSE CVE CVE-2017-5341 page","url":"https://www.suse.com/security/cve/CVE-2017-5341/"},{"category":"self","summary":"SUSE CVE CVE-2017-5342 page","url":"https://www.suse.com/security/cve/CVE-2017-5342/"},{"category":"self","summary":"SUSE CVE CVE-2017-5482 page","url":"https://www.suse.com/security/cve/CVE-2017-5482/"},{"category":"self","summary":"SUSE CVE CVE-2017-5483 page","url":"https://www.suse.com/security/cve/CVE-2017-5483/"},{"category":"self","summary":"SUSE CVE CVE-2017-5484 page","url":"https://www.suse.com/security/cve/CVE-2017-5484/"},{"category":"self","summary":"SUSE CVE CVE-2017-5485 page","url":"https://www.suse.com/security/cve/CVE-2017-5485/"},{"category":"self","summary":"SUSE CVE CVE-2017-5486 page","url":"https://www.suse.com/security/cve/CVE-2017-5486/"},{"category":"self","summary":"SUSE CVE CVE-2018-10103 page","url":"https://www.suse.com/security/cve/CVE-2018-10103/"},{"category":"self","summary":"SUSE CVE CVE-2018-10105 page","url":"https://www.suse.com/security/cve/CVE-2018-10105/"},{"category":"self","summary":"SUSE CVE CVE-2018-14461 page","url":"https://www.suse.com/security/cve/CVE-2018-14461/"},{"category":"self","summary":"SUSE CVE CVE-2018-14462 page","url":"https://www.suse.com/security/cve/CVE-2018-14462/"},{"category":"self","summary":"SUSE CVE CVE-2018-14463 page","url":"https://www.suse.com/security/cve/CVE-2018-14463/"},{"category":"self","summary":"SUSE CVE CVE-2018-14464 page","url":"https://www.suse.com/security/cve/CVE-2018-14464/"},{"category":"self","summary":"SUSE CVE CVE-2018-14465 page","url":"https://www.suse.com/security/cve/CVE-2018-14465/"},{"category":"self","summary":"SUSE CVE CVE-2018-14466 page","url":"https://www.suse.com/security/cve/CVE-2018-14466/"},{"category":"self","summary":"SUSE CVE CVE-2018-14467 page","url":"https://www.suse.com/security/cve/CVE-2018-14467/"},{"category":"self","summary":"SUSE CVE CVE-2018-14468 page","url":"https://www.suse.com/security/cve/CVE-2018-14468/"},{"category":"self","summary":"SUSE CVE CVE-2018-14469 page","url":"https://www.suse.com/security/cve/CVE-2018-14469/"},{"category":"self","summary":"SUSE CVE CVE-2018-14470 page","url":"https://www.suse.com/security/cve/CVE-2018-14470/"},{"category":"self","summary":"SUSE CVE CVE-2018-14879 page","url":"https://www.suse.com/security/cve/CVE-2018-14879/"},{"category":"self","summary":"SUSE CVE CVE-2018-14880 page","url":"https://www.suse.com/security/cve/CVE-2018-14880/"},{"category":"self","summary":"SUSE CVE CVE-2018-14881 page","url":"https://www.suse.com/security/cve/CVE-2018-14881/"},{"category":"self","summary":"SUSE CVE CVE-2018-14882 page","url":"https://www.suse.com/security/cve/CVE-2018-14882/"},{"category":"self","summary":"SUSE CVE CVE-2018-16227 page","url":"https://www.suse.com/security/cve/CVE-2018-16227/"},{"category":"self","summary":"SUSE CVE CVE-2018-16228 page","url":"https://www.suse.com/security/cve/CVE-2018-16228/"},{"category":"self","summary":"SUSE CVE CVE-2018-16229 page","url":"https://www.suse.com/security/cve/CVE-2018-16229/"},{"category":"self","summary":"SUSE CVE CVE-2018-16230 page","url":"https://www.suse.com/security/cve/CVE-2018-16230/"},{"category":"self","summary":"SUSE CVE CVE-2018-16300 page","url":"https://www.suse.com/security/cve/CVE-2018-16300/"},{"category":"self","summary":"SUSE CVE CVE-2018-16301 page","url":"https://www.suse.com/security/cve/CVE-2018-16301/"},{"category":"self","summary":"SUSE CVE CVE-2018-16451 page","url":"https://www.suse.com/security/cve/CVE-2018-16451/"},{"category":"self","summary":"SUSE CVE CVE-2018-16452 page","url":"https://www.suse.com/security/cve/CVE-2018-16452/"},{"category":"self","summary":"SUSE CVE CVE-2018-19519 page","url":"https://www.suse.com/security/cve/CVE-2018-19519/"},{"category":"self","summary":"SUSE CVE CVE-2019-1010220 page","url":"https://www.suse.com/security/cve/CVE-2019-1010220/"},{"category":"self","summary":"SUSE CVE CVE-2019-15166 page","url":"https://www.suse.com/security/cve/CVE-2019-15166/"},{"category":"self","summary":"SUSE CVE CVE-2019-15167 page","url":"https://www.suse.com/security/cve/CVE-2019-15167/"},{"category":"self","summary":"SUSE CVE CVE-2020-8037 page","url":"https://www.suse.com/security/cve/CVE-2020-8037/"}],"title":"tcpdump-4.99.1-1.2 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:11425-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"tcpdump-4.99.1-1.2.aarch64","product":{"name":"tcpdump-4.99.1-1.2.aarch64","product_id":"tcpdump-4.99.1-1.2.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"tcpdump-4.99.1-1.2.ppc64le","product":{"name":"tcpdump-4.99.1-1.2.ppc64le","product_id":"tcpdump-4.99.1-1.2.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"tcpdump-4.99.1-1.2.s390x","product":{"name":"tcpdump-4.99.1-1.2.s390x","product_id":"tcpdump-4.99.1-1.2.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"tcpdump-4.99.1-1.2.x86_64","product":{"name":"tcpdump-4.99.1-1.2.x86_64","product_id":"tcpdump-4.99.1-1.2.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"tcpdump-4.99.1-1.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64"},"product_reference":"tcpdump-4.99.1-1.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tcpdump-4.99.1-1.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le"},"product_reference":"tcpdump-4.99.1-1.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tcpdump-4.99.1-1.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x"},"product_reference":"tcpdump-4.99.1-1.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tcpdump-4.99.1-1.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"},"product_reference":"tcpdump-4.99.1-1.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2016-7922","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7922"}],"notes":[{"category":"general","text":"The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7922","url":"https://www.suse.com/security/cve/CVE-2016-7922"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7922","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7922"},{"cve":"CVE-2016-7923","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7923"}],"notes":[{"category":"general","text":"The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7923","url":"https://www.suse.com/security/cve/CVE-2016-7923"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7923","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7923"},{"cve":"CVE-2016-7924","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7924"}],"notes":[{"category":"general","text":"The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7924","url":"https://www.suse.com/security/cve/CVE-2016-7924"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7924","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7924"},{"cve":"CVE-2016-7925","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7925"}],"notes":[{"category":"general","text":"The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7925","url":"https://www.suse.com/security/cve/CVE-2016-7925"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7925","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7925"},{"cve":"CVE-2016-7926","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7926"}],"notes":[{"category":"general","text":"The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7926","url":"https://www.suse.com/security/cve/CVE-2016-7926"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7926","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7926"},{"cve":"CVE-2016-7927","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7927"}],"notes":[{"category":"general","text":"The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7927","url":"https://www.suse.com/security/cve/CVE-2016-7927"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7927","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7927"},{"cve":"CVE-2016-7928","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7928"}],"notes":[{"category":"general","text":"The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7928","url":"https://www.suse.com/security/cve/CVE-2016-7928"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7928","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7928"},{"cve":"CVE-2016-7929","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7929"}],"notes":[{"category":"general","text":"The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7929","url":"https://www.suse.com/security/cve/CVE-2016-7929"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7929","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7929"},{"cve":"CVE-2016-7930","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7930"}],"notes":[{"category":"general","text":"The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7930","url":"https://www.suse.com/security/cve/CVE-2016-7930"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7930","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7930"},{"cve":"CVE-2016-7931","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7931"}],"notes":[{"category":"general","text":"The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7931","url":"https://www.suse.com/security/cve/CVE-2016-7931"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7931","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7931"},{"cve":"CVE-2016-7932","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7932"}],"notes":[{"category":"general","text":"The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7932","url":"https://www.suse.com/security/cve/CVE-2016-7932"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7932","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7932"},{"cve":"CVE-2016-7933","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7933"}],"notes":[{"category":"general","text":"The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7933","url":"https://www.suse.com/security/cve/CVE-2016-7933"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7933","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7933"},{"cve":"CVE-2016-7934","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7934"}],"notes":[{"category":"general","text":"The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7934","url":"https://www.suse.com/security/cve/CVE-2016-7934"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7934","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7934"},{"cve":"CVE-2016-7935","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7935"}],"notes":[{"category":"general","text":"The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7935","url":"https://www.suse.com/security/cve/CVE-2016-7935"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7935","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7935"},{"cve":"CVE-2016-7936","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7936"}],"notes":[{"category":"general","text":"The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7936","url":"https://www.suse.com/security/cve/CVE-2016-7936"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7936","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7936"},{"cve":"CVE-2016-7937","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7937"}],"notes":[{"category":"general","text":"The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7937","url":"https://www.suse.com/security/cve/CVE-2016-7937"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7937","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7937"},{"cve":"CVE-2016-7938","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7938"}],"notes":[{"category":"general","text":"The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7938","url":"https://www.suse.com/security/cve/CVE-2016-7938"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7938","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7938"},{"cve":"CVE-2016-7939","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7939"}],"notes":[{"category":"general","text":"The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7939","url":"https://www.suse.com/security/cve/CVE-2016-7939"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7939","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7939"},{"cve":"CVE-2016-7940","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7940"}],"notes":[{"category":"general","text":"The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7940","url":"https://www.suse.com/security/cve/CVE-2016-7940"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7940","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7940"},{"cve":"CVE-2016-7973","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7973"}],"notes":[{"category":"general","text":"The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7973","url":"https://www.suse.com/security/cve/CVE-2016-7973"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7973","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7973"},{"cve":"CVE-2016-7974","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7974"}],"notes":[{"category":"general","text":"The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7974","url":"https://www.suse.com/security/cve/CVE-2016-7974"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7974","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7974"},{"cve":"CVE-2016-7975","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7975"}],"notes":[{"category":"general","text":"The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7975","url":"https://www.suse.com/security/cve/CVE-2016-7975"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7975","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7975"},{"cve":"CVE-2016-7983","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7983"}],"notes":[{"category":"general","text":"The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7983","url":"https://www.suse.com/security/cve/CVE-2016-7983"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7983","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7983"},{"cve":"CVE-2016-7984","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7984"}],"notes":[{"category":"general","text":"The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7984","url":"https://www.suse.com/security/cve/CVE-2016-7984"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7984","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7984"},{"cve":"CVE-2016-7985","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7985"}],"notes":[{"category":"general","text":"The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7985","url":"https://www.suse.com/security/cve/CVE-2016-7985"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7985","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7985"},{"cve":"CVE-2016-7986","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7986"}],"notes":[{"category":"general","text":"The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7986","url":"https://www.suse.com/security/cve/CVE-2016-7986"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7986","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7986"},{"cve":"CVE-2016-7992","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7992"}],"notes":[{"category":"general","text":"The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7992","url":"https://www.suse.com/security/cve/CVE-2016-7992"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7992","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7992"},{"cve":"CVE-2016-7993","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-7993"}],"notes":[{"category":"general","text":"A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-7993","url":"https://www.suse.com/security/cve/CVE-2016-7993"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-7993","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-7993"},{"cve":"CVE-2016-8574","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-8574"}],"notes":[{"category":"general","text":"The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-8574","url":"https://www.suse.com/security/cve/CVE-2016-8574"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-8574","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-8574"},{"cve":"CVE-2016-8575","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-8575"}],"notes":[{"category":"general","text":"The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-8575","url":"https://www.suse.com/security/cve/CVE-2016-8575"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2016-8575","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-8575"},{"cve":"CVE-2017-11108","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-11108"}],"notes":[{"category":"general","text":"tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-11108","url":"https://www.suse.com/security/cve/CVE-2017-11108"},{"category":"external","summary":"SUSE Bug 1047873 for CVE-2017-11108","url":"https://bugzilla.suse.com/1047873"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-11108","url":"https://bugzilla.suse.com/1057247"},{"category":"external","summary":"SUSE Bug 1123142 for CVE-2017-11108","url":"https://bugzilla.suse.com/1123142"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-11108"},{"cve":"CVE-2017-11541","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-11541"}],"notes":[{"category":"general","text":"tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-11541","url":"https://www.suse.com/security/cve/CVE-2017-11541"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-11541","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-11541","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-11541","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-11541","url":"https://bugzilla.suse.com/1057247"},{"category":"external","summary":"SUSE Bug 1123142 for CVE-2017-11541","url":"https://bugzilla.suse.com/1123142"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-11541"},{"cve":"CVE-2017-11542","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-11542"}],"notes":[{"category":"general","text":"tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-11542","url":"https://www.suse.com/security/cve/CVE-2017-11542"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-11542","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-11542","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-11542","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-11542","url":"https://bugzilla.suse.com/1057247"},{"category":"external","summary":"SUSE Bug 1123142 for CVE-2017-11542","url":"https://bugzilla.suse.com/1123142"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-11542"},{"cve":"CVE-2017-11543","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-11543"}],"notes":[{"category":"general","text":"tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-11543","url":"https://www.suse.com/security/cve/CVE-2017-11543"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-11543","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-11543","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-11543","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-11543","url":"https://bugzilla.suse.com/1057247"},{"category":"external","summary":"SUSE Bug 1123142 for CVE-2017-11543","url":"https://bugzilla.suse.com/1123142"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-11543"},{"cve":"CVE-2017-12893","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12893"}],"notes":[{"category":"general","text":"The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12893","url":"https://www.suse.com/security/cve/CVE-2017-12893"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12893","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12893","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12893","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12893","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12893"},{"cve":"CVE-2017-12894","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12894"}],"notes":[{"category":"general","text":"Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12894","url":"https://www.suse.com/security/cve/CVE-2017-12894"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12894","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12894","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12894","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12894","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12894"},{"cve":"CVE-2017-12895","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12895"}],"notes":[{"category":"general","text":"The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12895","url":"https://www.suse.com/security/cve/CVE-2017-12895"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12895","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12895","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12895","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12895","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12895"},{"cve":"CVE-2017-12896","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12896"}],"notes":[{"category":"general","text":"The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12896","url":"https://www.suse.com/security/cve/CVE-2017-12896"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12896","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12896","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12896","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12896","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12896"},{"cve":"CVE-2017-12897","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12897"}],"notes":[{"category":"general","text":"The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12897","url":"https://www.suse.com/security/cve/CVE-2017-12897"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12897","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12897","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12897","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12897","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12897"},{"cve":"CVE-2017-12898","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12898"}],"notes":[{"category":"general","text":"The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12898","url":"https://www.suse.com/security/cve/CVE-2017-12898"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12898","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12898","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12898","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12898","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12898"},{"cve":"CVE-2017-12899","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12899"}],"notes":[{"category":"general","text":"The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12899","url":"https://www.suse.com/security/cve/CVE-2017-12899"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12899","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12899","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12899","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12899","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12899"},{"cve":"CVE-2017-12900","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12900"}],"notes":[{"category":"general","text":"Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12900","url":"https://www.suse.com/security/cve/CVE-2017-12900"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12900","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12900","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12900","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12900","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12900"},{"cve":"CVE-2017-12901","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12901"}],"notes":[{"category":"general","text":"The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12901","url":"https://www.suse.com/security/cve/CVE-2017-12901"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12901","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12901","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12901","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12901","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12901"},{"cve":"CVE-2017-12902","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12902"}],"notes":[{"category":"general","text":"The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12902","url":"https://www.suse.com/security/cve/CVE-2017-12902"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12902","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12902","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12902","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12902","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12902"},{"cve":"CVE-2017-12985","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12985"}],"notes":[{"category":"general","text":"The IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12985","url":"https://www.suse.com/security/cve/CVE-2017-12985"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12985","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12985","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12985","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12985","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12985"},{"cve":"CVE-2017-12986","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12986"}],"notes":[{"category":"general","text":"The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12986","url":"https://www.suse.com/security/cve/CVE-2017-12986"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12986","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12986","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12986","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12986","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12986"},{"cve":"CVE-2017-12987","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12987"}],"notes":[{"category":"general","text":"The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12987","url":"https://www.suse.com/security/cve/CVE-2017-12987"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12987","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12987","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12987","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12987","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12987"},{"cve":"CVE-2017-12988","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12988"}],"notes":[{"category":"general","text":"The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12988","url":"https://www.suse.com/security/cve/CVE-2017-12988"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12988","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12988","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12988","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12988","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12988"},{"cve":"CVE-2017-12989","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12989"}],"notes":[{"category":"general","text":"The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12989","url":"https://www.suse.com/security/cve/CVE-2017-12989"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12989","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12989","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12989","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12989","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12989"},{"cve":"CVE-2017-12990","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12990"}],"notes":[{"category":"general","text":"The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12990","url":"https://www.suse.com/security/cve/CVE-2017-12990"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12990","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12990","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12990","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12990","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12990"},{"cve":"CVE-2017-12991","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12991"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12991","url":"https://www.suse.com/security/cve/CVE-2017-12991"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12991","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12991","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12991","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12991","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12991"},{"cve":"CVE-2017-12992","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12992"}],"notes":[{"category":"general","text":"The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12992","url":"https://www.suse.com/security/cve/CVE-2017-12992"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12992","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12992","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12992","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12992","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12992"},{"cve":"CVE-2017-12993","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12993"}],"notes":[{"category":"general","text":"The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12993","url":"https://www.suse.com/security/cve/CVE-2017-12993"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12993","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12993","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12993","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12993","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12993"},{"cve":"CVE-2017-12994","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12994"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12994","url":"https://www.suse.com/security/cve/CVE-2017-12994"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12994","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12994","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12994","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12994","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12994"},{"cve":"CVE-2017-12995","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12995"}],"notes":[{"category":"general","text":"The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12995","url":"https://www.suse.com/security/cve/CVE-2017-12995"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12995","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12995","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12995","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12995","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12995"},{"cve":"CVE-2017-12996","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12996"}],"notes":[{"category":"general","text":"The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12996","url":"https://www.suse.com/security/cve/CVE-2017-12996"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12996","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12996","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12996","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12996","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12996"},{"cve":"CVE-2017-12997","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12997"}],"notes":[{"category":"general","text":"The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12997","url":"https://www.suse.com/security/cve/CVE-2017-12997"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12997","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12997","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12997","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12997","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12997"},{"cve":"CVE-2017-12998","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12998"}],"notes":[{"category":"general","text":"The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12998","url":"https://www.suse.com/security/cve/CVE-2017-12998"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12998","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12998","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12998","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12998","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12998"},{"cve":"CVE-2017-12999","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-12999"}],"notes":[{"category":"general","text":"The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-12999","url":"https://www.suse.com/security/cve/CVE-2017-12999"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-12999","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-12999","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-12999","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-12999","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-12999"},{"cve":"CVE-2017-13000","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13000"}],"notes":[{"category":"general","text":"The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13000","url":"https://www.suse.com/security/cve/CVE-2017-13000"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13000","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13000","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13000","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13000","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13000"},{"cve":"CVE-2017-13001","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13001"}],"notes":[{"category":"general","text":"The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13001","url":"https://www.suse.com/security/cve/CVE-2017-13001"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13001","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13001","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13001","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13001","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13001"},{"cve":"CVE-2017-13002","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13002"}],"notes":[{"category":"general","text":"The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13002","url":"https://www.suse.com/security/cve/CVE-2017-13002"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13002","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13002","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13002","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13002","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13002"},{"cve":"CVE-2017-13003","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13003"}],"notes":[{"category":"general","text":"The LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13003","url":"https://www.suse.com/security/cve/CVE-2017-13003"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13003","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13003","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13003","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13003","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13003"},{"cve":"CVE-2017-13004","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13004"}],"notes":[{"category":"general","text":"The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13004","url":"https://www.suse.com/security/cve/CVE-2017-13004"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13004","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13004","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13004","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13004","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13004"},{"cve":"CVE-2017-13005","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13005"}],"notes":[{"category":"general","text":"The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13005","url":"https://www.suse.com/security/cve/CVE-2017-13005"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13005","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13005","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13005","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13005","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13005"},{"cve":"CVE-2017-13006","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13006"}],"notes":[{"category":"general","text":"The L2TP parser in tcpdump before 4.9.2 has a buffer over-read in print-l2tp.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13006","url":"https://www.suse.com/security/cve/CVE-2017-13006"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13006","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13006","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13006","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13006","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13006"},{"cve":"CVE-2017-13007","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13007"}],"notes":[{"category":"general","text":"The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13007","url":"https://www.suse.com/security/cve/CVE-2017-13007"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13007","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13007","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13007","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13007","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13007"},{"cve":"CVE-2017-13008","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13008"}],"notes":[{"category":"general","text":"The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13008","url":"https://www.suse.com/security/cve/CVE-2017-13008"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13008","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13008","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13008","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13008","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13008"},{"cve":"CVE-2017-13009","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13009"}],"notes":[{"category":"general","text":"The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13009","url":"https://www.suse.com/security/cve/CVE-2017-13009"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13009","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13009","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13009","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13009","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13009"},{"cve":"CVE-2017-13010","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13010"}],"notes":[{"category":"general","text":"The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13010","url":"https://www.suse.com/security/cve/CVE-2017-13010"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13010","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13010","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13010","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13010","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13010"},{"cve":"CVE-2017-13011","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13011"}],"notes":[{"category":"general","text":"Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13011","url":"https://www.suse.com/security/cve/CVE-2017-13011"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13011","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13011","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13011","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13011","url":"https://bugzilla.suse.com/1057247"},{"category":"external","summary":"SUSE Bug 1123142 for CVE-2017-13011","url":"https://bugzilla.suse.com/1123142"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13011"},{"cve":"CVE-2017-13012","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13012"}],"notes":[{"category":"general","text":"The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13012","url":"https://www.suse.com/security/cve/CVE-2017-13012"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13012","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13012","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13012","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13012","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13012"},{"cve":"CVE-2017-13013","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13013"}],"notes":[{"category":"general","text":"The ARP parser in tcpdump before 4.9.2 has a buffer over-read in print-arp.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13013","url":"https://www.suse.com/security/cve/CVE-2017-13013"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13013","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13013","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13013","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13013","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13013"},{"cve":"CVE-2017-13014","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13014"}],"notes":[{"category":"general","text":"The White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13014","url":"https://www.suse.com/security/cve/CVE-2017-13014"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13014","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13014","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13014","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13014","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13014"},{"cve":"CVE-2017-13015","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13015"}],"notes":[{"category":"general","text":"The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13015","url":"https://www.suse.com/security/cve/CVE-2017-13015"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13015","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13015","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13015","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13015","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13015"},{"cve":"CVE-2017-13016","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13016"}],"notes":[{"category":"general","text":"The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13016","url":"https://www.suse.com/security/cve/CVE-2017-13016"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13016","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13016","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13016","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13016","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13016"},{"cve":"CVE-2017-13017","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13017"}],"notes":[{"category":"general","text":"The DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13017","url":"https://www.suse.com/security/cve/CVE-2017-13017"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13017","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13017","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13017","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13017","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13017"},{"cve":"CVE-2017-13018","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13018"}],"notes":[{"category":"general","text":"The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13018","url":"https://www.suse.com/security/cve/CVE-2017-13018"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13018","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13018","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13018","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13018","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13018"},{"cve":"CVE-2017-13019","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13019"}],"notes":[{"category":"general","text":"The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13019","url":"https://www.suse.com/security/cve/CVE-2017-13019"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13019","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13019","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13019","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13019","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13019"},{"cve":"CVE-2017-13020","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13020"}],"notes":[{"category":"general","text":"The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13020","url":"https://www.suse.com/security/cve/CVE-2017-13020"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13020","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13020","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13020","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13020","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13020"},{"cve":"CVE-2017-13021","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13021"}],"notes":[{"category":"general","text":"The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13021","url":"https://www.suse.com/security/cve/CVE-2017-13021"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13021","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13021","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13021","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13021","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13021"},{"cve":"CVE-2017-13022","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13022"}],"notes":[{"category":"general","text":"The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13022","url":"https://www.suse.com/security/cve/CVE-2017-13022"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13022","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13022","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13022","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13022","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13022"},{"cve":"CVE-2017-13023","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13023"}],"notes":[{"category":"general","text":"The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13023","url":"https://www.suse.com/security/cve/CVE-2017-13023"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13023","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13023","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13023","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13023","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13023"},{"cve":"CVE-2017-13024","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13024"}],"notes":[{"category":"general","text":"The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13024","url":"https://www.suse.com/security/cve/CVE-2017-13024"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13024","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13024","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13024","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13024","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13024"},{"cve":"CVE-2017-13025","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13025"}],"notes":[{"category":"general","text":"The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13025","url":"https://www.suse.com/security/cve/CVE-2017-13025"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13025","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13025","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13025","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13025","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13025"},{"cve":"CVE-2017-13026","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13026"}],"notes":[{"category":"general","text":"The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13026","url":"https://www.suse.com/security/cve/CVE-2017-13026"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13026","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13026","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13026","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13026","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13026"},{"cve":"CVE-2017-13027","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13027"}],"notes":[{"category":"general","text":"The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13027","url":"https://www.suse.com/security/cve/CVE-2017-13027"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13027","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13027","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13027","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13027","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13027"},{"cve":"CVE-2017-13028","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13028"}],"notes":[{"category":"general","text":"The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13028","url":"https://www.suse.com/security/cve/CVE-2017-13028"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13028","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13028","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13028","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13028","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13028"},{"cve":"CVE-2017-13029","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13029"}],"notes":[{"category":"general","text":"The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:print_ccp_config_options().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13029","url":"https://www.suse.com/security/cve/CVE-2017-13029"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13029","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13029","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13029","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13029","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13029"},{"cve":"CVE-2017-13030","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13030"}],"notes":[{"category":"general","text":"The PIM parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13030","url":"https://www.suse.com/security/cve/CVE-2017-13030"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13030","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13030","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13030","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13030","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13030"},{"cve":"CVE-2017-13031","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13031"}],"notes":[{"category":"general","text":"The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13031","url":"https://www.suse.com/security/cve/CVE-2017-13031"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13031","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13031","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13031","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13031","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13031"},{"cve":"CVE-2017-13032","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13032"}],"notes":[{"category":"general","text":"The RADIUS parser in tcpdump before 4.9.2 has a buffer over-read in print-radius.c:print_attr_string().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13032","url":"https://www.suse.com/security/cve/CVE-2017-13032"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13032","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13032","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13032","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13032","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13032"},{"cve":"CVE-2017-13033","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13033"}],"notes":[{"category":"general","text":"The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13033","url":"https://www.suse.com/security/cve/CVE-2017-13033"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13033","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13033","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13033","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13033","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13033"},{"cve":"CVE-2017-13034","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13034"}],"notes":[{"category":"general","text":"The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13034","url":"https://www.suse.com/security/cve/CVE-2017-13034"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13034","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13034","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13034","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13034","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13034"},{"cve":"CVE-2017-13035","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13035"}],"notes":[{"category":"general","text":"The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13035","url":"https://www.suse.com/security/cve/CVE-2017-13035"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13035","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13035","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13035","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13035","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13035"},{"cve":"CVE-2017-13036","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13036"}],"notes":[{"category":"general","text":"The OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13036","url":"https://www.suse.com/security/cve/CVE-2017-13036"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13036","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13036","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13036","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13036","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13036"},{"cve":"CVE-2017-13037","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13037"}],"notes":[{"category":"general","text":"The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13037","url":"https://www.suse.com/security/cve/CVE-2017-13037"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13037","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13037","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13037","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13037","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13037"},{"cve":"CVE-2017-13038","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13038"}],"notes":[{"category":"general","text":"The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13038","url":"https://www.suse.com/security/cve/CVE-2017-13038"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13038","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13038","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13038","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13038","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13038"},{"cve":"CVE-2017-13039","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13039"}],"notes":[{"category":"general","text":"The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13039","url":"https://www.suse.com/security/cve/CVE-2017-13039"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13039","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13039","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13039","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13039","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13039"},{"cve":"CVE-2017-13040","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13040"}],"notes":[{"category":"general","text":"The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13040","url":"https://www.suse.com/security/cve/CVE-2017-13040"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13040","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13040","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13040","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13040","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13040"},{"cve":"CVE-2017-13041","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13041"}],"notes":[{"category":"general","text":"The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13041","url":"https://www.suse.com/security/cve/CVE-2017-13041"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13041","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13041","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13041","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13041","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13041"},{"cve":"CVE-2017-13042","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13042"}],"notes":[{"category":"general","text":"The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13042","url":"https://www.suse.com/security/cve/CVE-2017-13042"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13042","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13042","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13042","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13042","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13042"},{"cve":"CVE-2017-13043","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13043"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13043","url":"https://www.suse.com/security/cve/CVE-2017-13043"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13043","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13043","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13043","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13043","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13043"},{"cve":"CVE-2017-13044","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13044"}],"notes":[{"category":"general","text":"The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13044","url":"https://www.suse.com/security/cve/CVE-2017-13044"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13044","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13044","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13044","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13044","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13044"},{"cve":"CVE-2017-13045","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13045"}],"notes":[{"category":"general","text":"The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13045","url":"https://www.suse.com/security/cve/CVE-2017-13045"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13045","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13045","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13045","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13045","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13045"},{"cve":"CVE-2017-13046","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13046"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13046","url":"https://www.suse.com/security/cve/CVE-2017-13046"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13046","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13046","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13046","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13046","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13046"},{"cve":"CVE-2017-13047","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13047"}],"notes":[{"category":"general","text":"The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13047","url":"https://www.suse.com/security/cve/CVE-2017-13047"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13047","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13047","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13047","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13047","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13047"},{"cve":"CVE-2017-13048","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13048"}],"notes":[{"category":"general","text":"The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13048","url":"https://www.suse.com/security/cve/CVE-2017-13048"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13048","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13048","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13048","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13048","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13048"},{"cve":"CVE-2017-13049","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13049"}],"notes":[{"category":"general","text":"The Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13049","url":"https://www.suse.com/security/cve/CVE-2017-13049"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13049","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13049","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13049","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13049","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13049"},{"cve":"CVE-2017-13050","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13050"}],"notes":[{"category":"general","text":"The RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13050","url":"https://www.suse.com/security/cve/CVE-2017-13050"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13050","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13050","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13050","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13050","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13050"},{"cve":"CVE-2017-13051","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13051"}],"notes":[{"category":"general","text":"The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13051","url":"https://www.suse.com/security/cve/CVE-2017-13051"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13051","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13051","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13051","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13051","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13051"},{"cve":"CVE-2017-13052","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13052"}],"notes":[{"category":"general","text":"The CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13052","url":"https://www.suse.com/security/cve/CVE-2017-13052"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13052","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13052","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13052","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13052","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13052"},{"cve":"CVE-2017-13053","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13053"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13053","url":"https://www.suse.com/security/cve/CVE-2017-13053"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13053","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13053","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13053","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13053","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13053"},{"cve":"CVE-2017-13054","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13054"}],"notes":[{"category":"general","text":"The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13054","url":"https://www.suse.com/security/cve/CVE-2017-13054"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13054","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13054","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13054","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13054","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13054"},{"cve":"CVE-2017-13055","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13055"}],"notes":[{"category":"general","text":"The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13055","url":"https://www.suse.com/security/cve/CVE-2017-13055"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13055","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13055","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13055","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13055","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13055"},{"cve":"CVE-2017-13687","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13687"}],"notes":[{"category":"general","text":"The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13687","url":"https://www.suse.com/security/cve/CVE-2017-13687"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13687","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13687","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13687","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13687","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13687"},{"cve":"CVE-2017-13688","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13688"}],"notes":[{"category":"general","text":"The OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13688","url":"https://www.suse.com/security/cve/CVE-2017-13688"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13688","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13688","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13688","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13688","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13688"},{"cve":"CVE-2017-13689","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13689"}],"notes":[{"category":"general","text":"The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13689","url":"https://www.suse.com/security/cve/CVE-2017-13689"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13689","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13689","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13689","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13689","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13689"},{"cve":"CVE-2017-13690","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13690"}],"notes":[{"category":"general","text":"The IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13690","url":"https://www.suse.com/security/cve/CVE-2017-13690"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13690","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13690","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13690","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13690","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13690"},{"cve":"CVE-2017-13725","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-13725"}],"notes":[{"category":"general","text":"The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-13725","url":"https://www.suse.com/security/cve/CVE-2017-13725"},{"category":"external","summary":"SUSE Bug 1050219 for CVE-2017-13725","url":"https://bugzilla.suse.com/1050219"},{"category":"external","summary":"SUSE Bug 1050222 for CVE-2017-13725","url":"https://bugzilla.suse.com/1050222"},{"category":"external","summary":"SUSE Bug 1050225 for CVE-2017-13725","url":"https://bugzilla.suse.com/1050225"},{"category":"external","summary":"SUSE Bug 1057247 for CVE-2017-13725","url":"https://bugzilla.suse.com/1057247"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-13725"},{"cve":"CVE-2017-16808","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-16808"}],"notes":[{"category":"general","text":"tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-16808","url":"https://www.suse.com/security/cve/CVE-2017-16808"},{"category":"external","summary":"SUSE Bug 1068716 for CVE-2017-16808","url":"https://bugzilla.suse.com/1068716"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2017-16808","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-16808"},{"cve":"CVE-2017-5202","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5202"}],"notes":[{"category":"general","text":"The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5202","url":"https://www.suse.com/security/cve/CVE-2017-5202"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5202","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5202"},{"cve":"CVE-2017-5203","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5203"}],"notes":[{"category":"general","text":"The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5203","url":"https://www.suse.com/security/cve/CVE-2017-5203"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5203","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5203"},{"cve":"CVE-2017-5204","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5204"}],"notes":[{"category":"general","text":"The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5204","url":"https://www.suse.com/security/cve/CVE-2017-5204"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5204","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5204"},{"cve":"CVE-2017-5205","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5205"}],"notes":[{"category":"general","text":"The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5205","url":"https://www.suse.com/security/cve/CVE-2017-5205"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5205","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5205"},{"cve":"CVE-2017-5341","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5341"}],"notes":[{"category":"general","text":"The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5341","url":"https://www.suse.com/security/cve/CVE-2017-5341"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5341","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5341"},{"cve":"CVE-2017-5342","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5342"}],"notes":[{"category":"general","text":"In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5342","url":"https://www.suse.com/security/cve/CVE-2017-5342"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5342","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5342"},{"cve":"CVE-2017-5482","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5482"}],"notes":[{"category":"general","text":"The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5482","url":"https://www.suse.com/security/cve/CVE-2017-5482"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5482","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5482"},{"cve":"CVE-2017-5483","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5483"}],"notes":[{"category":"general","text":"The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5483","url":"https://www.suse.com/security/cve/CVE-2017-5483"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5483","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5483"},{"cve":"CVE-2017-5484","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5484"}],"notes":[{"category":"general","text":"The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5484","url":"https://www.suse.com/security/cve/CVE-2017-5484"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5484","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5484"},{"cve":"CVE-2017-5485","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5485"}],"notes":[{"category":"general","text":"The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5485","url":"https://www.suse.com/security/cve/CVE-2017-5485"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5485","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5485"},{"cve":"CVE-2017-5486","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5486"}],"notes":[{"category":"general","text":"The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5486","url":"https://www.suse.com/security/cve/CVE-2017-5486"},{"category":"external","summary":"SUSE Bug 1020940 for CVE-2017-5486","url":"https://bugzilla.suse.com/1020940"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5486"},{"cve":"CVE-2018-10103","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-10103"}],"notes":[{"category":"general","text":"tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-10103","url":"https://www.suse.com/security/cve/CVE-2018-10103"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-10103","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-10103"},{"cve":"CVE-2018-10105","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-10105"}],"notes":[{"category":"general","text":"tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-10105","url":"https://www.suse.com/security/cve/CVE-2018-10105"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-10105","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-10105"},{"cve":"CVE-2018-14461","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14461"}],"notes":[{"category":"general","text":"The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14461","url":"https://www.suse.com/security/cve/CVE-2018-14461"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14461","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14461"},{"cve":"CVE-2018-14462","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14462"}],"notes":[{"category":"general","text":"The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14462","url":"https://www.suse.com/security/cve/CVE-2018-14462"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14462","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14462"},{"cve":"CVE-2018-14463","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14463"}],"notes":[{"category":"general","text":"The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14463","url":"https://www.suse.com/security/cve/CVE-2018-14463"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14463","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14463"},{"cve":"CVE-2018-14464","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14464"}],"notes":[{"category":"general","text":"The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14464","url":"https://www.suse.com/security/cve/CVE-2018-14464"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14464","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14464"},{"cve":"CVE-2018-14465","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14465"}],"notes":[{"category":"general","text":"The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14465","url":"https://www.suse.com/security/cve/CVE-2018-14465"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14465","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14465"},{"cve":"CVE-2018-14466","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14466"}],"notes":[{"category":"general","text":"The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14466","url":"https://www.suse.com/security/cve/CVE-2018-14466"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14466","url":"https://bugzilla.suse.com/1153098"},{"category":"external","summary":"SUSE Bug 1166972 for CVE-2018-14466","url":"https://bugzilla.suse.com/1166972"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14466"},{"cve":"CVE-2018-14467","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14467"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14467","url":"https://www.suse.com/security/cve/CVE-2018-14467"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14467","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14467"},{"cve":"CVE-2018-14468","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14468"}],"notes":[{"category":"general","text":"The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14468","url":"https://www.suse.com/security/cve/CVE-2018-14468"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14468","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14468"},{"cve":"CVE-2018-14469","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14469"}],"notes":[{"category":"general","text":"The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14469","url":"https://www.suse.com/security/cve/CVE-2018-14469"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14469","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14469"},{"cve":"CVE-2018-14470","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14470"}],"notes":[{"category":"general","text":"The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14470","url":"https://www.suse.com/security/cve/CVE-2018-14470"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14470","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14470"},{"cve":"CVE-2018-14879","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14879"}],"notes":[{"category":"general","text":"The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14879","url":"https://www.suse.com/security/cve/CVE-2018-14879"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14879","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":0,"baseSeverity":"NONE","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14879"},{"cve":"CVE-2018-14880","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14880"}],"notes":[{"category":"general","text":"The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14880","url":"https://www.suse.com/security/cve/CVE-2018-14880"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14880","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14880"},{"cve":"CVE-2018-14881","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14881"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14881","url":"https://www.suse.com/security/cve/CVE-2018-14881"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14881","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14881"},{"cve":"CVE-2018-14882","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-14882"}],"notes":[{"category":"general","text":"The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-14882","url":"https://www.suse.com/security/cve/CVE-2018-14882"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-14882","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-14882"},{"cve":"CVE-2018-16227","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16227"}],"notes":[{"category":"general","text":"The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16227","url":"https://www.suse.com/security/cve/CVE-2018-16227"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16227","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16227"},{"cve":"CVE-2018-16228","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16228"}],"notes":[{"category":"general","text":"The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16228","url":"https://www.suse.com/security/cve/CVE-2018-16228"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16228","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16228"},{"cve":"CVE-2018-16229","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16229"}],"notes":[{"category":"general","text":"The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16229","url":"https://www.suse.com/security/cve/CVE-2018-16229"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16229","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16229"},{"cve":"CVE-2018-16230","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16230"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16230","url":"https://www.suse.com/security/cve/CVE-2018-16230"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16230","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16230"},{"cve":"CVE-2018-16300","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16300"}],"notes":[{"category":"general","text":"The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16300","url":"https://www.suse.com/security/cve/CVE-2018-16300"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16300","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16300"},{"cve":"CVE-2018-16301","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16301"}],"notes":[{"category":"general","text":"The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16301","url":"https://www.suse.com/security/cve/CVE-2018-16301"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16301","url":"https://bugzilla.suse.com/1153098"},{"category":"external","summary":"SUSE Bug 1153332 for CVE-2018-16301","url":"https://bugzilla.suse.com/1153332"},{"category":"external","summary":"SUSE Bug 1195825 for CVE-2018-16301","url":"https://bugzilla.suse.com/1195825"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2018-16301"},{"cve":"CVE-2018-16451","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16451"}],"notes":[{"category":"general","text":"The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \\MAILSLOT\\BROWSE and \\PIPE\\LANMAN.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16451","url":"https://www.suse.com/security/cve/CVE-2018-16451"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16451","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16451"},{"cve":"CVE-2018-16452","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-16452"}],"notes":[{"category":"general","text":"The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-16452","url":"https://www.suse.com/security/cve/CVE-2018-16452"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2018-16452","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-16452"},{"cve":"CVE-2018-19519","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-19519"}],"notes":[{"category":"general","text":"In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-19519","url":"https://www.suse.com/security/cve/CVE-2018-19519"},{"category":"external","summary":"SUSE Bug 1117267 for CVE-2018-19519","url":"https://bugzilla.suse.com/1117267"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-19519"},{"cve":"CVE-2019-1010220","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-1010220"}],"notes":[{"category":"general","text":"tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: \"ND_PRINT((ndo, \"%s\", buf));\", in function named \"print_prefix\", in \"print-hncp.c\". The attack vector is: The victim must open a specially crafted pcap file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-1010220","url":"https://www.suse.com/security/cve/CVE-2019-1010220"},{"category":"external","summary":"SUSE Bug 1142439 for CVE-2019-1010220","url":"https://bugzilla.suse.com/1142439"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2019-1010220","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-1010220"},{"cve":"CVE-2019-15166","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-15166"}],"notes":[{"category":"general","text":"lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-15166","url":"https://www.suse.com/security/cve/CVE-2019-15166"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2019-15166","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-15166"},{"cve":"CVE-2019-15167","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-15167"}],"notes":[{"category":"general","text":"The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-15167","url":"https://www.suse.com/security/cve/CVE-2019-15167"},{"category":"external","summary":"SUSE Bug 1153098 for CVE-2019-15167","url":"https://bugzilla.suse.com/1153098"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-15167"},{"cve":"CVE-2020-8037","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8037"}],"notes":[{"category":"general","text":"The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-8037","url":"https://www.suse.com/security/cve/CVE-2020-8037"},{"category":"external","summary":"SUSE Bug 1178466 for CVE-2020-8037","url":"https://bugzilla.suse.com/1178466"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:tcpdump-4.99.1-1.2.aarch64","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.ppc64le","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.s390x","openSUSE Tumbleweed:tcpdump-4.99.1-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-8037"}]}