<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">tcpdump-4.99.1-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11425</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">tcpdump-4.99.1-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the tcpdump-4.99.1-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11425</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11425</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7922/</URL>
      <Description>SUSE CVE CVE-2016-7922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7923/</URL>
      <Description>SUSE CVE CVE-2016-7923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7924/</URL>
      <Description>SUSE CVE CVE-2016-7924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7925/</URL>
      <Description>SUSE CVE CVE-2016-7925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7926/</URL>
      <Description>SUSE CVE CVE-2016-7926 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7927/</URL>
      <Description>SUSE CVE CVE-2016-7927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7928/</URL>
      <Description>SUSE CVE CVE-2016-7928 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7929/</URL>
      <Description>SUSE CVE CVE-2016-7929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7930/</URL>
      <Description>SUSE CVE CVE-2016-7930 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7931/</URL>
      <Description>SUSE CVE CVE-2016-7931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7932/</URL>
      <Description>SUSE CVE CVE-2016-7932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7933/</URL>
      <Description>SUSE CVE CVE-2016-7933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7934/</URL>
      <Description>SUSE CVE CVE-2016-7934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7935/</URL>
      <Description>SUSE CVE CVE-2016-7935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7936/</URL>
      <Description>SUSE CVE CVE-2016-7936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7937/</URL>
      <Description>SUSE CVE CVE-2016-7937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7938/</URL>
      <Description>SUSE CVE CVE-2016-7938 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7939/</URL>
      <Description>SUSE CVE CVE-2016-7939 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7940/</URL>
      <Description>SUSE CVE CVE-2016-7940 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7973/</URL>
      <Description>SUSE CVE CVE-2016-7973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7974/</URL>
      <Description>SUSE CVE CVE-2016-7974 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7975/</URL>
      <Description>SUSE CVE CVE-2016-7975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7983/</URL>
      <Description>SUSE CVE CVE-2016-7983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7984/</URL>
      <Description>SUSE CVE CVE-2016-7984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7985/</URL>
      <Description>SUSE CVE CVE-2016-7985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7986/</URL>
      <Description>SUSE CVE CVE-2016-7986 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7992/</URL>
      <Description>SUSE CVE CVE-2016-7992 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7993/</URL>
      <Description>SUSE CVE CVE-2016-7993 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8574/</URL>
      <Description>SUSE CVE CVE-2016-8574 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8575/</URL>
      <Description>SUSE CVE CVE-2016-8575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11108/</URL>
      <Description>SUSE CVE CVE-2017-11108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11541/</URL>
      <Description>SUSE CVE CVE-2017-11541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11542/</URL>
      <Description>SUSE CVE CVE-2017-11542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11543/</URL>
      <Description>SUSE CVE CVE-2017-11543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12893/</URL>
      <Description>SUSE CVE CVE-2017-12893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12894/</URL>
      <Description>SUSE CVE CVE-2017-12894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12895/</URL>
      <Description>SUSE CVE CVE-2017-12895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12896/</URL>
      <Description>SUSE CVE CVE-2017-12896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12897/</URL>
      <Description>SUSE CVE CVE-2017-12897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12898/</URL>
      <Description>SUSE CVE CVE-2017-12898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12899/</URL>
      <Description>SUSE CVE CVE-2017-12899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12900/</URL>
      <Description>SUSE CVE CVE-2017-12900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12901/</URL>
      <Description>SUSE CVE CVE-2017-12901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12902/</URL>
      <Description>SUSE CVE CVE-2017-12902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12985/</URL>
      <Description>SUSE CVE CVE-2017-12985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12986/</URL>
      <Description>SUSE CVE CVE-2017-12986 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12987/</URL>
      <Description>SUSE CVE CVE-2017-12987 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12988/</URL>
      <Description>SUSE CVE CVE-2017-12988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12989/</URL>
      <Description>SUSE CVE CVE-2017-12989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12990/</URL>
      <Description>SUSE CVE CVE-2017-12990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12991/</URL>
      <Description>SUSE CVE CVE-2017-12991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12992/</URL>
      <Description>SUSE CVE CVE-2017-12992 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12993/</URL>
      <Description>SUSE CVE CVE-2017-12993 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12994/</URL>
      <Description>SUSE CVE CVE-2017-12994 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12995/</URL>
      <Description>SUSE CVE CVE-2017-12995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12996/</URL>
      <Description>SUSE CVE CVE-2017-12996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12997/</URL>
      <Description>SUSE CVE CVE-2017-12997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12998/</URL>
      <Description>SUSE CVE CVE-2017-12998 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12999/</URL>
      <Description>SUSE CVE CVE-2017-12999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13000/</URL>
      <Description>SUSE CVE CVE-2017-13000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13001/</URL>
      <Description>SUSE CVE CVE-2017-13001 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13002/</URL>
      <Description>SUSE CVE CVE-2017-13002 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13003/</URL>
      <Description>SUSE CVE CVE-2017-13003 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13004/</URL>
      <Description>SUSE CVE CVE-2017-13004 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13005/</URL>
      <Description>SUSE CVE CVE-2017-13005 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13006/</URL>
      <Description>SUSE CVE CVE-2017-13006 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13007/</URL>
      <Description>SUSE CVE CVE-2017-13007 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13008/</URL>
      <Description>SUSE CVE CVE-2017-13008 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13009/</URL>
      <Description>SUSE CVE CVE-2017-13009 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13010/</URL>
      <Description>SUSE CVE CVE-2017-13010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13011/</URL>
      <Description>SUSE CVE CVE-2017-13011 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13012/</URL>
      <Description>SUSE CVE CVE-2017-13012 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13013/</URL>
      <Description>SUSE CVE CVE-2017-13013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13014/</URL>
      <Description>SUSE CVE CVE-2017-13014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13015/</URL>
      <Description>SUSE CVE CVE-2017-13015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13016/</URL>
      <Description>SUSE CVE CVE-2017-13016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13017/</URL>
      <Description>SUSE CVE CVE-2017-13017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13018/</URL>
      <Description>SUSE CVE CVE-2017-13018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13019/</URL>
      <Description>SUSE CVE CVE-2017-13019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13020/</URL>
      <Description>SUSE CVE CVE-2017-13020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13021/</URL>
      <Description>SUSE CVE CVE-2017-13021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13022/</URL>
      <Description>SUSE CVE CVE-2017-13022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13023/</URL>
      <Description>SUSE CVE CVE-2017-13023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13024/</URL>
      <Description>SUSE CVE CVE-2017-13024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13025/</URL>
      <Description>SUSE CVE CVE-2017-13025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13026/</URL>
      <Description>SUSE CVE CVE-2017-13026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13027/</URL>
      <Description>SUSE CVE CVE-2017-13027 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13028/</URL>
      <Description>SUSE CVE CVE-2017-13028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13029/</URL>
      <Description>SUSE CVE CVE-2017-13029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13030/</URL>
      <Description>SUSE CVE CVE-2017-13030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13031/</URL>
      <Description>SUSE CVE CVE-2017-13031 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13032/</URL>
      <Description>SUSE CVE CVE-2017-13032 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13033/</URL>
      <Description>SUSE CVE CVE-2017-13033 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13034/</URL>
      <Description>SUSE CVE CVE-2017-13034 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13035/</URL>
      <Description>SUSE CVE CVE-2017-13035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13036/</URL>
      <Description>SUSE CVE CVE-2017-13036 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13037/</URL>
      <Description>SUSE CVE CVE-2017-13037 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13038/</URL>
      <Description>SUSE CVE CVE-2017-13038 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13039/</URL>
      <Description>SUSE CVE CVE-2017-13039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13040/</URL>
      <Description>SUSE CVE CVE-2017-13040 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13041/</URL>
      <Description>SUSE CVE CVE-2017-13041 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13042/</URL>
      <Description>SUSE CVE CVE-2017-13042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13043/</URL>
      <Description>SUSE CVE CVE-2017-13043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13044/</URL>
      <Description>SUSE CVE CVE-2017-13044 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13045/</URL>
      <Description>SUSE CVE CVE-2017-13045 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13046/</URL>
      <Description>SUSE CVE CVE-2017-13046 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13047/</URL>
      <Description>SUSE CVE CVE-2017-13047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13048/</URL>
      <Description>SUSE CVE CVE-2017-13048 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13049/</URL>
      <Description>SUSE CVE CVE-2017-13049 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13050/</URL>
      <Description>SUSE CVE CVE-2017-13050 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13051/</URL>
      <Description>SUSE CVE CVE-2017-13051 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13052/</URL>
      <Description>SUSE CVE CVE-2017-13052 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13053/</URL>
      <Description>SUSE CVE CVE-2017-13053 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13054/</URL>
      <Description>SUSE CVE CVE-2017-13054 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13055/</URL>
      <Description>SUSE CVE CVE-2017-13055 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13687/</URL>
      <Description>SUSE CVE CVE-2017-13687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13688/</URL>
      <Description>SUSE CVE CVE-2017-13688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13689/</URL>
      <Description>SUSE CVE CVE-2017-13689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13690/</URL>
      <Description>SUSE CVE CVE-2017-13690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13725/</URL>
      <Description>SUSE CVE CVE-2017-13725 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16808/</URL>
      <Description>SUSE CVE CVE-2017-16808 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5202/</URL>
      <Description>SUSE CVE CVE-2017-5202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5203/</URL>
      <Description>SUSE CVE CVE-2017-5203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5204/</URL>
      <Description>SUSE CVE CVE-2017-5204 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5205/</URL>
      <Description>SUSE CVE CVE-2017-5205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5341/</URL>
      <Description>SUSE CVE CVE-2017-5341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5342/</URL>
      <Description>SUSE CVE CVE-2017-5342 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5482/</URL>
      <Description>SUSE CVE CVE-2017-5482 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5483/</URL>
      <Description>SUSE CVE CVE-2017-5483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5484/</URL>
      <Description>SUSE CVE CVE-2017-5484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5485/</URL>
      <Description>SUSE CVE CVE-2017-5485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5486/</URL>
      <Description>SUSE CVE CVE-2017-5486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10103/</URL>
      <Description>SUSE CVE CVE-2018-10103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10105/</URL>
      <Description>SUSE CVE CVE-2018-10105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14461/</URL>
      <Description>SUSE CVE CVE-2018-14461 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14462/</URL>
      <Description>SUSE CVE CVE-2018-14462 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14463/</URL>
      <Description>SUSE CVE CVE-2018-14463 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14464/</URL>
      <Description>SUSE CVE CVE-2018-14464 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14465/</URL>
      <Description>SUSE CVE CVE-2018-14465 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14466/</URL>
      <Description>SUSE CVE CVE-2018-14466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14467/</URL>
      <Description>SUSE CVE CVE-2018-14467 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14468/</URL>
      <Description>SUSE CVE CVE-2018-14468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14469/</URL>
      <Description>SUSE CVE CVE-2018-14469 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14470/</URL>
      <Description>SUSE CVE CVE-2018-14470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14879/</URL>
      <Description>SUSE CVE CVE-2018-14879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14880/</URL>
      <Description>SUSE CVE CVE-2018-14880 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14881/</URL>
      <Description>SUSE CVE CVE-2018-14881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14882/</URL>
      <Description>SUSE CVE CVE-2018-14882 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16227/</URL>
      <Description>SUSE CVE CVE-2018-16227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16228/</URL>
      <Description>SUSE CVE CVE-2018-16228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16229/</URL>
      <Description>SUSE CVE CVE-2018-16229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16230/</URL>
      <Description>SUSE CVE CVE-2018-16230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16300/</URL>
      <Description>SUSE CVE CVE-2018-16300 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16301/</URL>
      <Description>SUSE CVE CVE-2018-16301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16451/</URL>
      <Description>SUSE CVE CVE-2018-16451 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16452/</URL>
      <Description>SUSE CVE CVE-2018-16452 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19519/</URL>
      <Description>SUSE CVE CVE-2018-19519 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1010220/</URL>
      <Description>SUSE CVE CVE-2019-1010220 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15166/</URL>
      <Description>SUSE CVE CVE-2019-15166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15167/</URL>
      <Description>SUSE CVE CVE-2019-15167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8037/</URL>
      <Description>SUSE CVE CVE-2020-8037 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tcpdump-4.99.1-1.2">
      <FullProductName ProductID="tcpdump-4.99.1-1.2">tcpdump-4.99.1-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="tcpdump-4.99.1-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tcpdump-4.99.1-1.2">tcpdump-4.99.1-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().</Note>
    </Notes>
    <CVE>CVE-2016-7922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7922.html</URL>
        <Description>CVE-2016-7922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7923.html</URL>
        <Description>CVE-2016-7923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().</Note>
    </Notes>
    <CVE>CVE-2016-7924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7924.html</URL>
        <Description>CVE-2016-7924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().</Note>
    </Notes>
    <CVE>CVE-2016-7925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7925.html</URL>
        <Description>CVE-2016-7925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().</Note>
    </Notes>
    <CVE>CVE-2016-7926</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7926.html</URL>
        <Description>CVE-2016-7926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().</Note>
    </Notes>
    <CVE>CVE-2016-7927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7927.html</URL>
        <Description>CVE-2016-7927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7928.html</URL>
        <Description>CVE-2016-7928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().</Note>
    </Notes>
    <CVE>CVE-2016-7929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7929.html</URL>
        <Description>CVE-2016-7929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().</Note>
    </Notes>
    <CVE>CVE-2016-7930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7930.html</URL>
        <Description>CVE-2016-7930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().</Note>
    </Notes>
    <CVE>CVE-2016-7931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7931.html</URL>
        <Description>CVE-2016-7931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().</Note>
    </Notes>
    <CVE>CVE-2016-7932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7932.html</URL>
        <Description>CVE-2016-7932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().</Note>
    </Notes>
    <CVE>CVE-2016-7933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7933.html</URL>
        <Description>CVE-2016-7933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7934.html</URL>
        <Description>CVE-2016-7934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7935.html</URL>
        <Description>CVE-2016-7935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7936.html</URL>
        <Description>CVE-2016-7936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().</Note>
    </Notes>
    <CVE>CVE-2016-7937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7937.html</URL>
        <Description>CVE-2016-7937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().</Note>
    </Notes>
    <CVE>CVE-2016-7938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7938.html</URL>
        <Description>CVE-2016-7938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7939.html</URL>
        <Description>CVE-2016-7939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7940</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7940.html</URL>
        <Description>CVE-2016-7940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7973.html</URL>
        <Description>CVE-2016-7973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7974.html</URL>
        <Description>CVE-2016-7974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7975.html</URL>
        <Description>CVE-2016-7975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7983.html</URL>
        <Description>CVE-2016-7983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7984.html</URL>
        <Description>CVE-2016-7984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().</Note>
    </Notes>
    <CVE>CVE-2016-7985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7985.html</URL>
        <Description>CVE-2016-7985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7986</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7986.html</URL>
        <Description>CVE-2016-7986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().</Note>
    </Notes>
    <CVE>CVE-2016-7992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7992.html</URL>
        <Description>CVE-2016-7992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).</Note>
    </Notes>
    <CVE>CVE-2016-7993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7993.html</URL>
        <Description>CVE-2016-7993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().</Note>
    </Notes>
    <CVE>CVE-2016-8574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8574.html</URL>
        <Description>CVE-2016-8574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.</Note>
    </Notes>
    <CVE>CVE-2016-8575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8575.html</URL>
        <Description>CVE-2016-8575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.</Note>
    </Notes>
    <CVE>CVE-2017-11108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11108.html</URL>
        <Description>CVE-2017-11108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047873</URL>
        <Description>SUSE Bug 1047873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.</Note>
    </Notes>
    <CVE>CVE-2017-11541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11541.html</URL>
        <Description>CVE-2017-11541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.</Note>
    </Notes>
    <CVE>CVE-2017-11542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11542.html</URL>
        <Description>CVE-2017-11542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.</Note>
    </Notes>
    <CVE>CVE-2017-11543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11543.html</URL>
        <Description>CVE-2017-11543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().</Note>
    </Notes>
    <CVE>CVE-2017-12893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12893.html</URL>
        <Description>CVE-2017-12893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().</Note>
    </Notes>
    <CVE>CVE-2017-12894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12894.html</URL>
        <Description>CVE-2017-12894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().</Note>
    </Notes>
    <CVE>CVE-2017-12895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12895.html</URL>
        <Description>CVE-2017-12895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().</Note>
    </Notes>
    <CVE>CVE-2017-12896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12896.html</URL>
        <Description>CVE-2017-12896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().</Note>
    </Notes>
    <CVE>CVE-2017-12897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12897.html</URL>
        <Description>CVE-2017-12897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply().</Note>
    </Notes>
    <CVE>CVE-2017-12898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12898.html</URL>
        <Description>CVE-2017-12898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().</Note>
    </Notes>
    <CVE>CVE-2017-12899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12899.html</URL>
        <Description>CVE-2017-12899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().</Note>
    </Notes>
    <CVE>CVE-2017-12900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12900.html</URL>
        <Description>CVE-2017-12900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().</Note>
    </Notes>
    <CVE>CVE-2017-12901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12901.html</URL>
        <Description>CVE-2017-12901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-12902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12902.html</URL>
        <Description>CVE-2017-12902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().</Note>
    </Notes>
    <CVE>CVE-2017-12985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12985.html</URL>
        <Description>CVE-2017-12985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().</Note>
    </Notes>
    <CVE>CVE-2017-12986</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12986.html</URL>
        <Description>CVE-2017-12986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().</Note>
    </Notes>
    <CVE>CVE-2017-12987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12987.html</URL>
        <Description>CVE-2017-12987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().</Note>
    </Notes>
    <CVE>CVE-2017-12988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12988.html</URL>
        <Description>CVE-2017-12988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().</Note>
    </Notes>
    <CVE>CVE-2017-12989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12989.html</URL>
        <Description>CVE-2017-12989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-12990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12990.html</URL>
        <Description>CVE-2017-12990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().</Note>
    </Notes>
    <CVE>CVE-2017-12991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12991.html</URL>
        <Description>CVE-2017-12991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().</Note>
    </Notes>
    <CVE>CVE-2017-12992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12992.html</URL>
        <Description>CVE-2017-12992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-12993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12993.html</URL>
        <Description>CVE-2017-12993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().</Note>
    </Notes>
    <CVE>CVE-2017-12994</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12994.html</URL>
        <Description>CVE-2017-12994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().</Note>
    </Notes>
    <CVE>CVE-2017-12995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12995.html</URL>
        <Description>CVE-2017-12995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().</Note>
    </Notes>
    <CVE>CVE-2017-12996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12996.html</URL>
        <Description>CVE-2017-12996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().</Note>
    </Notes>
    <CVE>CVE-2017-12997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12997.html</URL>
        <Description>CVE-2017-12997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().</Note>
    </Notes>
    <CVE>CVE-2017-12998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12998.html</URL>
        <Description>CVE-2017-12998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().</Note>
    </Notes>
    <CVE>CVE-2017-12999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12999.html</URL>
        <Description>CVE-2017-12999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().</Note>
    </Notes>
    <CVE>CVE-2017-13000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13000.html</URL>
        <Description>CVE-2017-13000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().</Note>
    </Notes>
    <CVE>CVE-2017-13001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13001.html</URL>
        <Description>CVE-2017-13001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().</Note>
    </Notes>
    <CVE>CVE-2017-13002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13002.html</URL>
        <Description>CVE-2017-13002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13003.html</URL>
        <Description>CVE-2017-13003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().</Note>
    </Notes>
    <CVE>CVE-2017-13004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13004.html</URL>
        <Description>CVE-2017-13004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().</Note>
    </Notes>
    <CVE>CVE-2017-13005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13005.html</URL>
        <Description>CVE-2017-13005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The L2TP parser in tcpdump before 4.9.2 has a buffer over-read in print-l2tp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13006.html</URL>
        <Description>CVE-2017-13006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().</Note>
    </Notes>
    <CVE>CVE-2017-13007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13007.html</URL>
        <Description>CVE-2017-13007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().</Note>
    </Notes>
    <CVE>CVE-2017-13008</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13008.html</URL>
        <Description>CVE-2017-13008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print().</Note>
    </Notes>
    <CVE>CVE-2017-13009</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13009.html</URL>
        <Description>CVE-2017-13009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().</Note>
    </Notes>
    <CVE>CVE-2017-13010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13010.html</URL>
        <Description>CVE-2017-13010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().</Note>
    </Notes>
    <CVE>CVE-2017-13011</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13011.html</URL>
        <Description>CVE-2017-13011</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13012.html</URL>
        <Description>CVE-2017-13012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ARP parser in tcpdump before 4.9.2 has a buffer over-read in print-arp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13013.html</URL>
        <Description>CVE-2017-13013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13014.html</URL>
        <Description>CVE-2017-13014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().</Note>
    </Notes>
    <CVE>CVE-2017-13015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13015.html</URL>
        <Description>CVE-2017-13015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().</Note>
    </Notes>
    <CVE>CVE-2017-13016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13016.html</URL>
        <Description>CVE-2017-13016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13017.html</URL>
        <Description>CVE-2017-13017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13018.html</URL>
        <Description>CVE-2017-13018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13019.html</URL>
        <Description>CVE-2017-13019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13020.html</URL>
        <Description>CVE-2017-13020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13021.html</URL>
        <Description>CVE-2017-13021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().</Note>
    </Notes>
    <CVE>CVE-2017-13022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13022.html</URL>
        <Description>CVE-2017-13022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13023.html</URL>
        <Description>CVE-2017-13023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13024.html</URL>
        <Description>CVE-2017-13024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13025.html</URL>
        <Description>CVE-2017-13025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13026.html</URL>
        <Description>CVE-2017-13026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().</Note>
    </Notes>
    <CVE>CVE-2017-13027</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13027.html</URL>
        <Description>CVE-2017-13027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13028.html</URL>
        <Description>CVE-2017-13028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:print_ccp_config_options().</Note>
    </Notes>
    <CVE>CVE-2017-13029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13029.html</URL>
        <Description>CVE-2017-13029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PIM parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13030.html</URL>
        <Description>CVE-2017-13030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13031.html</URL>
        <Description>CVE-2017-13031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RADIUS parser in tcpdump before 4.9.2 has a buffer over-read in print-radius.c:print_attr_string().</Note>
    </Notes>
    <CVE>CVE-2017-13032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13032.html</URL>
        <Description>CVE-2017-13032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13033</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13033.html</URL>
        <Description>CVE-2017-13033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13034</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13034.html</URL>
        <Description>CVE-2017-13034</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id().</Note>
    </Notes>
    <CVE>CVE-2017-13035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13035.html</URL>
        <Description>CVE-2017-13035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3().</Note>
    </Notes>
    <CVE>CVE-2017-13036</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13036.html</URL>
        <Description>CVE-2017-13036</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().</Note>
    </Notes>
    <CVE>CVE-2017-13037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13037.html</URL>
        <Description>CVE-2017-13037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp().</Note>
    </Notes>
    <CVE>CVE-2017-13038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13038.html</URL>
        <Description>CVE-2017-13038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13039.html</URL>
        <Description>CVE-2017-13039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13040.html</URL>
        <Description>CVE-2017-13040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print().</Note>
    </Notes>
    <CVE>CVE-2017-13041</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13041.html</URL>
        <Description>CVE-2017-13041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13042.html</URL>
        <Description>CVE-2017-13042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn().</Note>
    </Notes>
    <CVE>CVE-2017-13043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13043.html</URL>
        <Description>CVE-2017-13043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print().</Note>
    </Notes>
    <CVE>CVE-2017-13044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13044.html</URL>
        <Description>CVE-2017-13044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13045.html</URL>
        <Description>CVE-2017-13045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().</Note>
    </Notes>
    <CVE>CVE-2017-13046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13046.html</URL>
        <Description>CVE-2017-13046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().</Note>
    </Notes>
    <CVE>CVE-2017-13047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13047.html</URL>
        <Description>CVE-2017-13047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().</Note>
    </Notes>
    <CVE>CVE-2017-13048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13048.html</URL>
        <Description>CVE-2017-13048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print().</Note>
    </Notes>
    <CVE>CVE-2017-13049</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13049.html</URL>
        <Description>CVE-2017-13049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print().</Note>
    </Notes>
    <CVE>CVE-2017-13050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13050.html</URL>
        <Description>CVE-2017-13050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().</Note>
    </Notes>
    <CVE>CVE-2017-13051</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13051.html</URL>
        <Description>CVE-2017-13051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13052.html</URL>
        <Description>CVE-2017-13052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().</Note>
    </Notes>
    <CVE>CVE-2017-13053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13053.html</URL>
        <Description>CVE-2017-13053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print().</Note>
    </Notes>
    <CVE>CVE-2017-13054</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13054.html</URL>
        <Description>CVE-2017-13054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv().</Note>
    </Notes>
    <CVE>CVE-2017-13055</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13055.html</URL>
        <Description>CVE-2017-13055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().</Note>
    </Notes>
    <CVE>CVE-2017-13687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13687.html</URL>
        <Description>CVE-2017-13687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print().</Note>
    </Notes>
    <CVE>CVE-2017-13688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13688.html</URL>
        <Description>CVE-2017-13688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().</Note>
    </Notes>
    <CVE>CVE-2017-13689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13689.html</URL>
        <Description>CVE-2017-13689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13690.html</URL>
        <Description>CVE-2017-13690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13725.html</URL>
        <Description>CVE-2017-13725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.</Note>
    </Notes>
    <CVE>CVE-2017-16808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16808.html</URL>
        <Description>CVE-2017-16808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068716</URL>
        <Description>SUSE Bug 1068716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().</Note>
    </Notes>
    <CVE>CVE-2017-5202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5202.html</URL>
        <Description>CVE-2017-5202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().</Note>
    </Notes>
    <CVE>CVE-2017-5203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5203.html</URL>
        <Description>CVE-2017-5203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().</Note>
    </Notes>
    <CVE>CVE-2017-5204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5204.html</URL>
        <Description>CVE-2017-5204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().</Note>
    </Notes>
    <CVE>CVE-2017-5205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5205.html</URL>
        <Description>CVE-2017-5205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().</Note>
    </Notes>
    <CVE>CVE-2017-5341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5341.html</URL>
        <Description>CVE-2017-5341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().</Note>
    </Notes>
    <CVE>CVE-2017-5342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5342.html</URL>
        <Description>CVE-2017-5342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.</Note>
    </Notes>
    <CVE>CVE-2017-5482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5482.html</URL>
        <Description>CVE-2017-5482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().</Note>
    </Notes>
    <CVE>CVE-2017-5483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5483.html</URL>
        <Description>CVE-2017-5483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().</Note>
    </Notes>
    <CVE>CVE-2017-5484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5484.html</URL>
        <Description>CVE-2017-5484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().</Note>
    </Notes>
    <CVE>CVE-2017-5485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5485.html</URL>
        <Description>CVE-2017-5485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().</Note>
    </Notes>
    <CVE>CVE-2017-5486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5486.html</URL>
        <Description>CVE-2017-5486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).</Note>
    </Notes>
    <CVE>CVE-2018-10103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10103.html</URL>
        <Description>CVE-2018-10103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).</Note>
    </Notes>
    <CVE>CVE-2018-10105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10105.html</URL>
        <Description>CVE-2018-10105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().</Note>
    </Notes>
    <CVE>CVE-2018-14461</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14461.html</URL>
        <Description>CVE-2018-14461</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().</Note>
    </Notes>
    <CVE>CVE-2018-14462</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14462.html</URL>
        <Description>CVE-2018-14462</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.</Note>
    </Notes>
    <CVE>CVE-2018-14463</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14463.html</URL>
        <Description>CVE-2018-14463</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().</Note>
    </Notes>
    <CVE>CVE-2018-14464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14464.html</URL>
        <Description>CVE-2018-14464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().</Note>
    </Notes>
    <CVE>CVE-2018-14465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14465.html</URL>
        <Description>CVE-2018-14465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().</Note>
    </Notes>
    <CVE>CVE-2018-14466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14466.html</URL>
        <Description>CVE-2018-14466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166972</URL>
        <Description>SUSE Bug 1166972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).</Note>
    </Notes>
    <CVE>CVE-2018-14467</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14467.html</URL>
        <Description>CVE-2018-14467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().</Note>
    </Notes>
    <CVE>CVE-2018-14468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14468.html</URL>
        <Description>CVE-2018-14468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().</Note>
    </Notes>
    <CVE>CVE-2018-14469</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14469.html</URL>
        <Description>CVE-2018-14469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().</Note>
    </Notes>
    <CVE>CVE-2018-14470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14470.html</URL>
        <Description>CVE-2018-14470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().</Note>
    </Notes>
    <CVE>CVE-2018-14879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14879.html</URL>
        <Description>CVE-2018-14879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().</Note>
    </Notes>
    <CVE>CVE-2018-14880</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14880.html</URL>
        <Description>CVE-2018-14880</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).</Note>
    </Notes>
    <CVE>CVE-2018-14881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14881.html</URL>
        <Description>CVE-2018-14881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.</Note>
    </Notes>
    <CVE>CVE-2018-14882</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14882.html</URL>
        <Description>CVE-2018-14882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.</Note>
    </Notes>
    <CVE>CVE-2018-16227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16227.html</URL>
        <Description>CVE-2018-16227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().</Note>
    </Notes>
    <CVE>CVE-2018-16228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16228.html</URL>
        <Description>CVE-2018-16228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().</Note>
    </Notes>
    <CVE>CVE-2018-16229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16229.html</URL>
        <Description>CVE-2018-16229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).</Note>
    </Notes>
    <CVE>CVE-2018-16230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16230.html</URL>
        <Description>CVE-2018-16230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.</Note>
    </Notes>
    <CVE>CVE-2018-16300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16300.html</URL>
        <Description>CVE-2018-16300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.</Note>
    </Notes>
    <CVE>CVE-2018-16301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16301.html</URL>
        <Description>CVE-2018-16301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153332</URL>
        <Description>SUSE Bug 1153332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195825</URL>
        <Description>SUSE Bug 1195825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.</Note>
    </Notes>
    <CVE>CVE-2018-16451</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16451.html</URL>
        <Description>CVE-2018-16451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.</Note>
    </Notes>
    <CVE>CVE-2018-16452</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16452.html</URL>
        <Description>CVE-2018-16452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.</Note>
    </Notes>
    <CVE>CVE-2018-19519</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19519.html</URL>
        <Description>CVE-2018-19519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117267</URL>
        <Description>SUSE Bug 1117267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.</Note>
    </Notes>
    <CVE>CVE-2019-1010220</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1010220.html</URL>
        <Description>CVE-2019-1010220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142439</URL>
        <Description>SUSE Bug 1142439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.</Note>
    </Notes>
    <CVE>CVE-2019-15166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15166.html</URL>
        <Description>CVE-2019-15166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.</Note>
    </Notes>
    <CVE>CVE-2019-15167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15167.html</URL>
        <Description>CVE-2019-15167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153098</URL>
        <Description>SUSE Bug 1153098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.</Note>
    </Notes>
    <CVE>CVE-2020-8037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tcpdump-4.99.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8037.html</URL>
        <Description>CVE-2020-8037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178466</URL>
        <Description>SUSE Bug 1178466</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
