<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libwireshark14-3.4.8-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11513</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libwireshark14-3.4.8-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libwireshark14-3.4.8-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11513</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11513</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1932/</URL>
      <Description>SUSE CVE CVE-2006-1932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4574/</URL>
      <Description>SUSE CVE CVE-2006-4574 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4805/</URL>
      <Description>SUSE CVE CVE-2006-4805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-5468/</URL>
      <Description>SUSE CVE CVE-2006-5468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-5469/</URL>
      <Description>SUSE CVE CVE-2006-5469 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-5740/</URL>
      <Description>SUSE CVE CVE-2006-5740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0456/</URL>
      <Description>SUSE CVE CVE-2007-0456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0457/</URL>
      <Description>SUSE CVE CVE-2007-0457 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0458/</URL>
      <Description>SUSE CVE CVE-2007-0458 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0459/</URL>
      <Description>SUSE CVE CVE-2007-0459 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11406/</URL>
      <Description>SUSE CVE CVE-2017-11406 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11407/</URL>
      <Description>SUSE CVE CVE-2017-11407 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11408/</URL>
      <Description>SUSE CVE CVE-2017-11408 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13764/</URL>
      <Description>SUSE CVE CVE-2017-13764 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13765/</URL>
      <Description>SUSE CVE CVE-2017-13765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13766/</URL>
      <Description>SUSE CVE CVE-2017-13766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13767/</URL>
      <Description>SUSE CVE CVE-2017-13767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15189/</URL>
      <Description>SUSE CVE CVE-2017-15189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15190/</URL>
      <Description>SUSE CVE CVE-2017-15190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15191/</URL>
      <Description>SUSE CVE CVE-2017-15191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15192/</URL>
      <Description>SUSE CVE CVE-2017-15192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15193/</URL>
      <Description>SUSE CVE CVE-2017-15193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17083/</URL>
      <Description>SUSE CVE CVE-2017-17083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17084/</URL>
      <Description>SUSE CVE CVE-2017-17084 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17085/</URL>
      <Description>SUSE CVE CVE-2017-17085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5596/</URL>
      <Description>SUSE CVE CVE-2017-5596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5597/</URL>
      <Description>SUSE CVE CVE-2017-5597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5753/</URL>
      <Description>SUSE CVE CVE-2017-5753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6467/</URL>
      <Description>SUSE CVE CVE-2017-6467 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6468/</URL>
      <Description>SUSE CVE CVE-2017-6468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6469/</URL>
      <Description>SUSE CVE CVE-2017-6469 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6470/</URL>
      <Description>SUSE CVE CVE-2017-6470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6471/</URL>
      <Description>SUSE CVE CVE-2017-6471 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6472/</URL>
      <Description>SUSE CVE CVE-2017-6472 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6473/</URL>
      <Description>SUSE CVE CVE-2017-6473 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6474/</URL>
      <Description>SUSE CVE CVE-2017-6474 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7700/</URL>
      <Description>SUSE CVE CVE-2017-7700 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7701/</URL>
      <Description>SUSE CVE CVE-2017-7701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7702/</URL>
      <Description>SUSE CVE CVE-2017-7702 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7703/</URL>
      <Description>SUSE CVE CVE-2017-7703 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7704/</URL>
      <Description>SUSE CVE CVE-2017-7704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7705/</URL>
      <Description>SUSE CVE CVE-2017-7705 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7745/</URL>
      <Description>SUSE CVE CVE-2017-7745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7746/</URL>
      <Description>SUSE CVE CVE-2017-7746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7747/</URL>
      <Description>SUSE CVE CVE-2017-7747 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7748/</URL>
      <Description>SUSE CVE CVE-2017-7748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9343/</URL>
      <Description>SUSE CVE CVE-2017-9343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9344/</URL>
      <Description>SUSE CVE CVE-2017-9344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9345/</URL>
      <Description>SUSE CVE CVE-2017-9345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9346/</URL>
      <Description>SUSE CVE CVE-2017-9346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9347/</URL>
      <Description>SUSE CVE CVE-2017-9347 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9348/</URL>
      <Description>SUSE CVE CVE-2017-9348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9349/</URL>
      <Description>SUSE CVE CVE-2017-9349 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9350/</URL>
      <Description>SUSE CVE CVE-2017-9350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9351/</URL>
      <Description>SUSE CVE CVE-2017-9351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9352/</URL>
      <Description>SUSE CVE CVE-2017-9352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9353/</URL>
      <Description>SUSE CVE CVE-2017-9353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9354/</URL>
      <Description>SUSE CVE CVE-2017-9354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11354/</URL>
      <Description>SUSE CVE CVE-2018-11354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11355/</URL>
      <Description>SUSE CVE CVE-2018-11355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11356/</URL>
      <Description>SUSE CVE CVE-2018-11356 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11357/</URL>
      <Description>SUSE CVE CVE-2018-11357 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11358/</URL>
      <Description>SUSE CVE CVE-2018-11358 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11359/</URL>
      <Description>SUSE CVE CVE-2018-11359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11360/</URL>
      <Description>SUSE CVE CVE-2018-11360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11361/</URL>
      <Description>SUSE CVE CVE-2018-11361 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11362/</URL>
      <Description>SUSE CVE CVE-2018-11362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12086/</URL>
      <Description>SUSE CVE CVE-2018-12086 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14339/</URL>
      <Description>SUSE CVE CVE-2018-14339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14340/</URL>
      <Description>SUSE CVE CVE-2018-14340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14341/</URL>
      <Description>SUSE CVE CVE-2018-14341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14342/</URL>
      <Description>SUSE CVE CVE-2018-14342 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14343/</URL>
      <Description>SUSE CVE CVE-2018-14343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14344/</URL>
      <Description>SUSE CVE CVE-2018-14344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14367/</URL>
      <Description>SUSE CVE CVE-2018-14367 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14368/</URL>
      <Description>SUSE CVE CVE-2018-14368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14369/</URL>
      <Description>SUSE CVE CVE-2018-14369 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14370/</URL>
      <Description>SUSE CVE CVE-2018-14370 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16056/</URL>
      <Description>SUSE CVE CVE-2018-16056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16057/</URL>
      <Description>SUSE CVE CVE-2018-16057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16058/</URL>
      <Description>SUSE CVE CVE-2018-16058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18225/</URL>
      <Description>SUSE CVE CVE-2018-18225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18226/</URL>
      <Description>SUSE CVE CVE-2018-18226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18227/</URL>
      <Description>SUSE CVE CVE-2018-18227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19622/</URL>
      <Description>SUSE CVE CVE-2018-19622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19623/</URL>
      <Description>SUSE CVE CVE-2018-19623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19624/</URL>
      <Description>SUSE CVE CVE-2018-19624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19625/</URL>
      <Description>SUSE CVE CVE-2018-19625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19626/</URL>
      <Description>SUSE CVE CVE-2018-19626 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19627/</URL>
      <Description>SUSE CVE CVE-2018-19627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19628/</URL>
      <Description>SUSE CVE CVE-2018-19628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5334/</URL>
      <Description>SUSE CVE CVE-2018-5334 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5335/</URL>
      <Description>SUSE CVE CVE-2018-5335 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5336/</URL>
      <Description>SUSE CVE CVE-2018-5336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7320/</URL>
      <Description>SUSE CVE CVE-2018-7320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7321/</URL>
      <Description>SUSE CVE CVE-2018-7321 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7325/</URL>
      <Description>SUSE CVE CVE-2018-7325 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7329/</URL>
      <Description>SUSE CVE CVE-2018-7329 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7333/</URL>
      <Description>SUSE CVE CVE-2018-7333 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7334/</URL>
      <Description>SUSE CVE CVE-2018-7334 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7335/</URL>
      <Description>SUSE CVE CVE-2018-7335 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7336/</URL>
      <Description>SUSE CVE CVE-2018-7336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7337/</URL>
      <Description>SUSE CVE CVE-2018-7337 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7417/</URL>
      <Description>SUSE CVE CVE-2018-7417 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7418/</URL>
      <Description>SUSE CVE CVE-2018-7418 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7419/</URL>
      <Description>SUSE CVE CVE-2018-7419 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7420/</URL>
      <Description>SUSE CVE CVE-2018-7420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9256/</URL>
      <Description>SUSE CVE CVE-2018-9256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9257/</URL>
      <Description>SUSE CVE CVE-2018-9257 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9258/</URL>
      <Description>SUSE CVE CVE-2018-9258 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9260/</URL>
      <Description>SUSE CVE CVE-2018-9260 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9261/</URL>
      <Description>SUSE CVE CVE-2018-9261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9262/</URL>
      <Description>SUSE CVE CVE-2018-9262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9263/</URL>
      <Description>SUSE CVE CVE-2018-9263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9264/</URL>
      <Description>SUSE CVE CVE-2018-9264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9265/</URL>
      <Description>SUSE CVE CVE-2018-9265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9269/</URL>
      <Description>SUSE CVE CVE-2018-9269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9273/</URL>
      <Description>SUSE CVE CVE-2018-9273 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10894/</URL>
      <Description>SUSE CVE CVE-2019-10894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10895/</URL>
      <Description>SUSE CVE CVE-2019-10895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10896/</URL>
      <Description>SUSE CVE CVE-2019-10896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10897/</URL>
      <Description>SUSE CVE CVE-2019-10897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10898/</URL>
      <Description>SUSE CVE CVE-2019-10898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10899/</URL>
      <Description>SUSE CVE CVE-2019-10899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10900/</URL>
      <Description>SUSE CVE CVE-2019-10900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10901/</URL>
      <Description>SUSE CVE CVE-2019-10901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10902/</URL>
      <Description>SUSE CVE CVE-2019-10902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10903/</URL>
      <Description>SUSE CVE CVE-2019-10903 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13619/</URL>
      <Description>SUSE CVE CVE-2019-13619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16319/</URL>
      <Description>SUSE CVE CVE-2019-16319 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19553/</URL>
      <Description>SUSE CVE CVE-2019-19553 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5716/</URL>
      <Description>SUSE CVE CVE-2019-5716 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5717/</URL>
      <Description>SUSE CVE CVE-2019-5717 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5718/</URL>
      <Description>SUSE CVE CVE-2019-5718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5719/</URL>
      <Description>SUSE CVE CVE-2019-5719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5721/</URL>
      <Description>SUSE CVE CVE-2019-5721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9208/</URL>
      <Description>SUSE CVE CVE-2019-9208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9209/</URL>
      <Description>SUSE CVE CVE-2019-9209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9214/</URL>
      <Description>SUSE CVE CVE-2019-9214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11647/</URL>
      <Description>SUSE CVE CVE-2020-11647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13164/</URL>
      <Description>SUSE CVE CVE-2020-13164 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15466/</URL>
      <Description>SUSE CVE CVE-2020-15466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-17498/</URL>
      <Description>SUSE CVE CVE-2020-17498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25862/</URL>
      <Description>SUSE CVE CVE-2020-25862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25863/</URL>
      <Description>SUSE CVE CVE-2020-25863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25866/</URL>
      <Description>SUSE CVE CVE-2020-25866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26418/</URL>
      <Description>SUSE CVE CVE-2020-26418 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26419/</URL>
      <Description>SUSE CVE CVE-2020-26419 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26420/</URL>
      <Description>SUSE CVE CVE-2020-26420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26421/</URL>
      <Description>SUSE CVE CVE-2020-26421 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26422/</URL>
      <Description>SUSE CVE CVE-2020-26422 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26575/</URL>
      <Description>SUSE CVE CVE-2020-26575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28030/</URL>
      <Description>SUSE CVE CVE-2020-28030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7044/</URL>
      <Description>SUSE CVE CVE-2020-7044 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9428/</URL>
      <Description>SUSE CVE CVE-2020-9428 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9429/</URL>
      <Description>SUSE CVE CVE-2020-9429 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9430/</URL>
      <Description>SUSE CVE CVE-2020-9430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9431/</URL>
      <Description>SUSE CVE CVE-2020-9431 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22173/</URL>
      <Description>SUSE CVE CVE-2021-22173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22174/</URL>
      <Description>SUSE CVE CVE-2021-22174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22191/</URL>
      <Description>SUSE CVE CVE-2021-22191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22207/</URL>
      <Description>SUSE CVE CVE-2021-22207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22235/</URL>
      <Description>SUSE CVE CVE-2021-22235 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libwireshark14-3.4.8-1.2">
      <FullProductName ProductID="libwireshark14-3.4.8-1.2">libwireshark14-3.4.8-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwiretap11-3.4.8-1.2">
      <FullProductName ProductID="libwiretap11-3.4.8-1.2">libwiretap11-3.4.8-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwsutil12-3.4.8-1.2">
      <FullProductName ProductID="libwsutil12-3.4.8-1.2">libwsutil12-3.4.8-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-3.4.8-1.2">
      <FullProductName ProductID="wireshark-3.4.8-1.2">wireshark-3.4.8-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-devel-3.4.8-1.2">
      <FullProductName ProductID="wireshark-devel-3.4.8-1.2">wireshark-devel-3.4.8-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-ui-qt-3.4.8-1.2">
      <FullProductName ProductID="wireshark-ui-qt-3.4.8-1.2">wireshark-ui-qt-3.4.8-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libwireshark14-3.4.8-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwireshark14-3.4.8-1.2">libwireshark14-3.4.8-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwiretap11-3.4.8-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwiretap11-3.4.8-1.2">libwiretap11-3.4.8-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwsutil12-3.4.8-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwsutil12-3.4.8-1.2">libwsutil12-3.4.8-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-3.4.8-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-3.4.8-1.2">wireshark-3.4.8-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-devel-3.4.8-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2">wireshark-devel-3.4.8-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-ui-qt-3.4.8-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2">wireshark-ui-qt-3.4.8-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the OID printing routine in Ethereal 0.10.x up to 0.10.14 has unknown impact and remote attack vectors.</Note>
    </Notes>
    <CVE>CVE-2006-1932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1932.html</URL>
        <Description>CVE-2006-1932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/167928</URL>
        <Description>SUSE Bug 167928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values.</Note>
    </Notes>
    <CVE>CVE-2006-4574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4574.html</URL>
        <Description>CVE-2006-4574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/213226</URL>
        <Description>SUSE Bug 213226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded.</Note>
    </Notes>
    <CVE>CVE-2006-4805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4805.html</URL>
        <Description>CVE-2006-4805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/213226</URL>
        <Description>SUSE Bug 213226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2006-5468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-5468.html</URL>
        <Description>CVE-2006-5468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/213226</URL>
        <Description>SUSE Bug 213226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference.</Note>
    </Notes>
    <CVE>CVE-2006-5469</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-5469.html</URL>
        <Description>CVE-2006-5469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/213226</URL>
        <Description>SUSE Bug 213226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.</Note>
    </Notes>
    <CVE>CVE-2006-5740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-5740.html</URL>
        <Description>CVE-2006-5740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/213226</URL>
        <Description>SUSE Bug 213226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/374694</URL>
        <Description>SUSE Bug 374694</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the LLT dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2007-0456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0456.html</URL>
        <Description>CVE-2007-0456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/237246</URL>
        <Description>SUSE Bug 237246</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the IEEE 802.11 dissector in Wireshark (formerly Ethereal) 0.10.14 through 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2007-0457</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0457.html</URL>
        <Description>CVE-2007-0457</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/237246</URL>
        <Description>SUSE Bug 237246</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors, a different issue than CVE-2006-5468.</Note>
    </Notes>
    <CVE>CVE-2007-0458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0458.html</URL>
        <Description>CVE-2007-0458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/237246</URL>
        <Description>SUSE Bug 237246</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.</Note>
    </Notes>
    <CVE>CVE-2007-0459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0459.html</URL>
        <Description>CVE-2007-0459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/237246</URL>
        <Description>SUSE Bug 237246</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.</Note>
    </Notes>
    <CVE>CVE-2017-11406</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11406.html</URL>
        <Description>CVE-2017-11406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049255</URL>
        <Description>SUSE Bug 1049255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.</Note>
    </Notes>
    <CVE>CVE-2017-11407</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11407.html</URL>
        <Description>CVE-2017-11407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049255</URL>
        <Description>SUSE Bug 1049255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.</Note>
    </Notes>
    <CVE>CVE-2017-11408</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11408.html</URL>
        <Description>CVE-2017-11408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049255</URL>
        <Description>SUSE Bug 1049255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0, the Modbus dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/packet-mbtcp.c by adding length validation.</Note>
    </Notes>
    <CVE>CVE-2017-13764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13764.html</URL>
        <Description>CVE-2017-13764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056250</URL>
        <Description>SUSE Bug 1056250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.</Note>
    </Notes>
    <CVE>CVE-2017-13765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13765.html</URL>
        <Description>CVE-2017-13765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056251</URL>
        <Description>SUSE Bug 1056251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation.</Note>
    </Notes>
    <CVE>CVE-2017-13766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13766.html</URL>
        <Description>CVE-2017-13766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056249</URL>
        <Description>SUSE Bug 1056249</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the MSDP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-msdp.c by adding length validation.</Note>
    </Notes>
    <CVE>CVE-2017-13767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13767.html</URL>
        <Description>CVE-2017-13767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056248</URL>
        <Description>SUSE Bug 1056248</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by adding decrements.</Note>
    </Notes>
    <CVE>CVE-2017-15189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15189.html</URL>
        <Description>CVE-2017-15189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062645</URL>
        <Description>SUSE Bug 1062645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.1, the RTSP dissector could crash. This was addressed in epan/dissectors/packet-rtsp.c by correcting the scope of a variable.</Note>
    </Notes>
    <CVE>CVE-2017-15190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15190.html</URL>
        <Description>CVE-2017-15190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062645</URL>
        <Description>SUSE Bug 1062645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.</Note>
    </Notes>
    <CVE>CVE-2017-15191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15191.html</URL>
        <Description>CVE-2017-15191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062645</URL>
        <Description>SUSE Bug 1062645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.</Note>
    </Notes>
    <CVE>CVE-2017-15192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15192.html</URL>
        <Description>CVE-2017-15192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062645</URL>
        <Description>SUSE Bug 1062645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.</Note>
    </Notes>
    <CVE>CVE-2017-15193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15193.html</URL>
        <Description>CVE-2017-15193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062645</URL>
        <Description>SUSE Bug 1062645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.</Note>
    </Notes>
    <CVE>CVE-2017-17083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17083.html</URL>
        <Description>CVE-2017-17083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070727</URL>
        <Description>SUSE Bug 1070727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.</Note>
    </Notes>
    <CVE>CVE-2017-17084</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17084.html</URL>
        <Description>CVE-2017-17084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070727</URL>
        <Description>SUSE Bug 1070727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.</Note>
    </Notes>
    <CVE>CVE-2017-17085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17085.html</URL>
        <Description>CVE-2017-17085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070727</URL>
        <Description>SUSE Bug 1070727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow.</Note>
    </Notes>
    <CVE>CVE-2017-5596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5596.html</URL>
        <Description>CVE-2017-5596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021739</URL>
        <Description>SUSE Bug 1021739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.</Note>
    </Notes>
    <CVE>CVE-2017-5597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5597.html</URL>
        <Description>CVE-2017-5597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021739</URL>
        <Description>SUSE Bug 1021739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2017-5753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5753.html</URL>
        <Description>CVE-2017-5753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075419</URL>
        <Description>SUSE Bug 1075419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075748</URL>
        <Description>SUSE Bug 1075748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080039</URL>
        <Description>SUSE Bug 1080039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087084</URL>
        <Description>SUSE Bug 1087084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136865</URL>
        <Description>SUSE Bug 1136865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209547</URL>
        <Description>SUSE Bug 1209547</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.</Note>
    </Notes>
    <CVE>CVE-2017-6467</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6467.html</URL>
        <Description>CVE-2017-6467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148181</URL>
        <Description>SUSE Bug 1148181</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.</Note>
    </Notes>
    <CVE>CVE-2017-6468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6468.html</URL>
        <Description>CVE-2017-6468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148182</URL>
        <Description>SUSE Bug 1148182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.</Note>
    </Notes>
    <CVE>CVE-2017-6469</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6469.html</URL>
        <Description>CVE-2017-6469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148185</URL>
        <Description>SUSE Bug 1148185</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.</Note>
    </Notes>
    <CVE>CVE-2017-6470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6470.html</URL>
        <Description>CVE-2017-6470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148186</URL>
        <Description>SUSE Bug 1148186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.</Note>
    </Notes>
    <CVE>CVE-2017-6471</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6471.html</URL>
        <Description>CVE-2017-6471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148187</URL>
        <Description>SUSE Bug 1148187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.</Note>
    </Notes>
    <CVE>CVE-2017-6472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6472.html</URL>
        <Description>CVE-2017-6472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148188</URL>
        <Description>SUSE Bug 1148188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.</Note>
    </Notes>
    <CVE>CVE-2017-6473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6473.html</URL>
        <Description>CVE-2017-6473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148189</URL>
        <Description>SUSE Bug 1148189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.</Note>
    </Notes>
    <CVE>CVE-2017-6474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6474.html</URL>
        <Description>CVE-2017-6474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027998</URL>
        <Description>SUSE Bug 1027998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148191</URL>
        <Description>SUSE Bug 1148191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.</Note>
    </Notes>
    <CVE>CVE-2017-7700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7700.html</URL>
        <Description>CVE-2017-7700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033936</URL>
        <Description>SUSE Bug 1033936</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.</Note>
    </Notes>
    <CVE>CVE-2017-7701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7701.html</URL>
        <Description>CVE-2017-7701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033937</URL>
        <Description>SUSE Bug 1033937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.</Note>
    </Notes>
    <CVE>CVE-2017-7702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7702.html</URL>
        <Description>CVE-2017-7702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033938</URL>
        <Description>SUSE Bug 1033938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049255</URL>
        <Description>SUSE Bug 1049255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.</Note>
    </Notes>
    <CVE>CVE-2017-7703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7703.html</URL>
        <Description>CVE-2017-7703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033939</URL>
        <Description>SUSE Bug 1033939</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.</Note>
    </Notes>
    <CVE>CVE-2017-7704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7704.html</URL>
        <Description>CVE-2017-7704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033940</URL>
        <Description>SUSE Bug 1033940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.</Note>
    </Notes>
    <CVE>CVE-2017-7705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7705.html</URL>
        <Description>CVE-2017-7705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033941</URL>
        <Description>SUSE Bug 1033941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check.</Note>
    </Notes>
    <CVE>CVE-2017-7745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7745.html</URL>
        <Description>CVE-2017-7745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033942</URL>
        <Description>SUSE Bug 1033942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length.</Note>
    </Notes>
    <CVE>CVE-2017-7746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7746.html</URL>
        <Description>CVE-2017-7746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033943</URL>
        <Description>SUSE Bug 1033943</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree.</Note>
    </Notes>
    <CVE>CVE-2017-7747</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7747.html</URL>
        <Description>CVE-2017-7747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033944</URL>
        <Description>SUSE Bug 1033944</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check.</Note>
    </Notes>
    <CVE>CVE-2017-7748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7748.html</URL>
        <Description>CVE-2017-7748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033945</URL>
        <Description>SUSE Bug 1033945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.</Note>
    </Notes>
    <CVE>CVE-2017-9343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9343.html</URL>
        <Description>CVE-2017-9343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042309</URL>
        <Description>SUSE Bug 1042309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077080</URL>
        <Description>SUSE Bug 1077080</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.</Note>
    </Notes>
    <CVE>CVE-2017-9344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9344.html</URL>
        <Description>CVE-2017-9344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042298</URL>
        <Description>SUSE Bug 1042298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.</Note>
    </Notes>
    <CVE>CVE-2017-9345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9345.html</URL>
        <Description>CVE-2017-9345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042300</URL>
        <Description>SUSE Bug 1042300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.</Note>
    </Notes>
    <CVE>CVE-2017-9346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9346.html</URL>
        <Description>CVE-2017-9346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042301</URL>
        <Description>SUSE Bug 1042301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.</Note>
    </Notes>
    <CVE>CVE-2017-9347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9347.html</URL>
        <Description>CVE-2017-9347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042308</URL>
        <Description>SUSE Bug 1042308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.</Note>
    </Notes>
    <CVE>CVE-2017-9348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9348.html</URL>
        <Description>CVE-2017-9348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042303</URL>
        <Description>SUSE Bug 1042303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.</Note>
    </Notes>
    <CVE>CVE-2017-9349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9349.html</URL>
        <Description>CVE-2017-9349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042305</URL>
        <Description>SUSE Bug 1042305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.</Note>
    </Notes>
    <CVE>CVE-2017-9350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9350.html</URL>
        <Description>CVE-2017-9350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042299</URL>
        <Description>SUSE Bug 1042299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049255</URL>
        <Description>SUSE Bug 1049255</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049621</URL>
        <Description>SUSE Bug 1049621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.</Note>
    </Notes>
    <CVE>CVE-2017-9351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9351.html</URL>
        <Description>CVE-2017-9351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042302</URL>
        <Description>SUSE Bug 1042302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.</Note>
    </Notes>
    <CVE>CVE-2017-9352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9352.html</URL>
        <Description>CVE-2017-9352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042304</URL>
        <Description>SUSE Bug 1042304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.</Note>
    </Notes>
    <CVE>CVE-2017-9353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9353.html</URL>
        <Description>CVE-2017-9353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042306</URL>
        <Description>SUSE Bug 1042306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.</Note>
    </Notes>
    <CVE>CVE-2017-9354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9354.html</URL>
        <Description>CVE-2017-9354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042307</URL>
        <Description>SUSE Bug 1042307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042324</URL>
        <Description>SUSE Bug 1042324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042330</URL>
        <Description>SUSE Bug 1042330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042331</URL>
        <Description>SUSE Bug 1042331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.</Note>
    </Notes>
    <CVE>CVE-2018-11354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11354.html</URL>
        <Description>CVE-2018-11354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.</Note>
    </Notes>
    <CVE>CVE-2018-11355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11355.html</URL>
        <Description>CVE-2018-11355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.</Note>
    </Notes>
    <CVE>CVE-2018-11356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11356.html</URL>
        <Description>CVE-2018-11356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.</Note>
    </Notes>
    <CVE>CVE-2018-11357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11357.html</URL>
        <Description>CVE-2018-11357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.</Note>
    </Notes>
    <CVE>CVE-2018-11358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11358.html</URL>
        <Description>CVE-2018-11358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2018-11359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11359.html</URL>
        <Description>CVE-2018-11359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2018-11360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11360.html</URL>
        <Description>CVE-2018-11360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.</Note>
    </Notes>
    <CVE>CVE-2018-11361</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11361.html</URL>
        <Description>CVE-2018-11361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.</Note>
    </Notes>
    <CVE>CVE-2018-11362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11362.html</URL>
        <Description>CVE-2018-11362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.</Note>
    </Notes>
    <CVE>CVE-2018-12086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12086.html</URL>
        <Description>CVE-2018-12086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.</Note>
    </Notes>
    <CVE>CVE-2018-14339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14339.html</URL>
        <Description>CVE-2018-14339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101810</URL>
        <Description>SUSE Bug 1101810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-14340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14340.html</URL>
        <Description>CVE-2018-14340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101804</URL>
        <Description>SUSE Bug 1101804</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.</Note>
    </Notes>
    <CVE>CVE-2018-14341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14341.html</URL>
        <Description>CVE-2018-14341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101776</URL>
        <Description>SUSE Bug 1101776</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.</Note>
    </Notes>
    <CVE>CVE-2018-14342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14342.html</URL>
        <Description>CVE-2018-14342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101777</URL>
        <Description>SUSE Bug 1101777</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.</Note>
    </Notes>
    <CVE>CVE-2018-14343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14343.html</URL>
        <Description>CVE-2018-14343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101786</URL>
        <Description>SUSE Bug 1101786</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-14344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14344.html</URL>
        <Description>CVE-2018-14344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101788</URL>
        <Description>SUSE Bug 1101788</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.</Note>
    </Notes>
    <CVE>CVE-2018-14367</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14367.html</URL>
        <Description>CVE-2018-14367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101791</URL>
        <Description>SUSE Bug 1101791</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.</Note>
    </Notes>
    <CVE>CVE-2018-14368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14368.html</URL>
        <Description>CVE-2018-14368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101794</URL>
        <Description>SUSE Bug 1101794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.</Note>
    </Notes>
    <CVE>CVE-2018-14369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14369.html</URL>
        <Description>CVE-2018-14369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101800</URL>
        <Description>SUSE Bug 1101800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-14370</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14370.html</URL>
        <Description>CVE-2018-14370</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101802</URL>
        <Description>SUSE Bug 1101802</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.</Note>
    </Notes>
    <CVE>CVE-2018-16056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16056.html</URL>
        <Description>CVE-2018-16056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106514</URL>
        <Description>SUSE Bug 1106514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.</Note>
    </Notes>
    <CVE>CVE-2018-16057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16057.html</URL>
        <Description>CVE-2018-16057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106514</URL>
        <Description>SUSE Bug 1106514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.</Note>
    </Notes>
    <CVE>CVE-2018-16058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16058.html</URL>
        <Description>CVE-2018-16058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106514</URL>
        <Description>SUSE Bug 1106514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.3, the CoAP dissector could crash. This was addressed in epan/dissectors/packet-coap.c by ensuring that the piv length is correctly computed.</Note>
    </Notes>
    <CVE>CVE-2018-18225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18225.html</URL>
        <Description>CVE-2018-18225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.3, the Steam IHS Discovery dissector could consume system memory. This was addressed in epan/dissectors/packet-steam-ihs-discovery.c by changing the memory-management approach.</Note>
    </Notes>
    <CVE>CVE-2018-18226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18226.html</URL>
        <Description>CVE-2018-18226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.</Note>
    </Notes>
    <CVE>CVE-2018-18227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18227.html</URL>
        <Description>CVE-2018-18227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.</Note>
    </Notes>
    <CVE>CVE-2018-19622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19622.html</URL>
        <Description>CVE-2018-19622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.</Note>
    </Notes>
    <CVE>CVE-2018-19623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19623.html</URL>
        <Description>CVE-2018-19623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2018-19624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19624.html</URL>
        <Description>CVE-2018-19624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-19625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19625.html</URL>
        <Description>CVE-2018-19625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.</Note>
    </Notes>
    <CVE>CVE-2018-19626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19626.html</URL>
        <Description>CVE-2018-19626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary.</Note>
    </Notes>
    <CVE>CVE-2018-19627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19627.html</URL>
        <Description>CVE-2018-19627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4, the ZigBee ZCL dissector could crash. This was addressed in epan/dissectors/packet-zbee-zcl-lighting.c by preventing a divide-by-zero error.</Note>
    </Notes>
    <CVE>CVE-2018-19628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19628.html</URL>
        <Description>CVE-2018-19628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.</Note>
    </Notes>
    <CVE>CVE-2018-5334</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5334.html</URL>
        <Description>CVE-2018-5334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075737</URL>
        <Description>SUSE Bug 1075737</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.</Note>
    </Notes>
    <CVE>CVE-2018-5335</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5335.html</URL>
        <Description>CVE-2018-5335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075738</URL>
        <Description>SUSE Bug 1075738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.</Note>
    </Notes>
    <CVE>CVE-2018-5336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5336.html</URL>
        <Description>CVE-2018-5336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075739</URL>
        <Description>SUSE Bug 1075739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.</Note>
    </Notes>
    <CVE>CVE-2018-7320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7320.html</URL>
        <Description>CVE-2018-7320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.</Note>
    </Notes>
    <CVE>CVE-2018-7321</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7321.html</URL>
        <Description>CVE-2018-7321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.</Note>
    </Notes>
    <CVE>CVE-2018-7325</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7325.html</URL>
        <Description>CVE-2018-7325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.</Note>
    </Notes>
    <CVE>CVE-2018-7329</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7329.html</URL>
        <Description>CVE-2018-7329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.</Note>
    </Notes>
    <CVE>CVE-2018-7333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7333.html</URL>
        <Description>CVE-2018-7333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.</Note>
    </Notes>
    <CVE>CVE-2018-7334</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7334.html</URL>
        <Description>CVE-2018-7334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.</Note>
    </Notes>
    <CVE>CVE-2018-7335</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7335.html</URL>
        <Description>CVE-2018-7335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.</Note>
    </Notes>
    <CVE>CVE-2018-7336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7336.html</URL>
        <Description>CVE-2018-7336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.</Note>
    </Notes>
    <CVE>CVE-2018-7337</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7337.html</URL>
        <Description>CVE-2018-7337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.</Note>
    </Notes>
    <CVE>CVE-2018-7417</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7417.html</URL>
        <Description>CVE-2018-7417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.</Note>
    </Notes>
    <CVE>CVE-2018-7418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7418.html</URL>
        <Description>CVE-2018-7418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.</Note>
    </Notes>
    <CVE>CVE-2018-7419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7419.html</URL>
        <Description>CVE-2018-7419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.</Note>
    </Notes>
    <CVE>CVE-2018-7420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7420.html</URL>
        <Description>CVE-2018-7420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082692</URL>
        <Description>SUSE Bug 1082692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the LWAPP dissector could crash. This was addressed in epan/dissectors/packet-lwapp.c by limiting the encapsulation levels to restrict the recursion depth.</Note>
    </Notes>
    <CVE>CVE-2018-9256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9256.html</URL>
        <Description>CVE-2018-9256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5, the CQL dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-cql.c by checking for a nonzero number of columns.</Note>
    </Notes>
    <CVE>CVE-2018-9257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9257.html</URL>
        <Description>CVE-2018-9257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by preserving valid data sources.</Note>
    </Notes>
    <CVE>CVE-2018-9258</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9258.html</URL>
        <Description>CVE-2018-9258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the IEEE 802.15.4 dissector could crash. This was addressed in epan/dissectors/packet-ieee802154.c by ensuring that an allocation step occurs.</Note>
    </Notes>
    <CVE>CVE-2018-9260</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9260.html</URL>
        <Description>CVE-2018-9260</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the NBAP dissector could crash with a large loop that ends with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-nbap.c by prohibiting the self-linking of DCH-IDs.</Note>
    </Notes>
    <CVE>CVE-2018-9261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9261.html</URL>
        <Description>CVE-2018-9261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the VLAN dissector could crash. This was addressed in epan/dissectors/packet-vlan.c by limiting VLAN tag nesting to restrict the recursion depth.</Note>
    </Notes>
    <CVE>CVE-2018-9262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9262.html</URL>
        <Description>CVE-2018-9262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the Kerberos dissector could crash. This was addressed in epan/dissectors/packet-kerberos.c by ensuring a nonzero key length.</Note>
    </Notes>
    <CVE>CVE-2018-9263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9263.html</URL>
        <Description>CVE-2018-9263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the ADB dissector could crash with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-adb.c by checking for a length inconsistency.</Note>
    </Notes>
    <CVE>CVE-2018-9264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9264.html</URL>
        <Description>CVE-2018-9264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-tn3270.c has a memory leak.</Note>
    </Notes>
    <CVE>CVE-2018-9265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9265.html</URL>
        <Description>CVE-2018-9265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-giop.c has a memory leak.</Note>
    </Notes>
    <CVE>CVE-2018-9269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9269.html</URL>
        <Description>CVE-2018-9269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak.</Note>
    </Notes>
    <CVE>CVE-2018-9273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9273.html</URL>
        <Description>CVE-2018-9273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088200</URL>
        <Description>SUSE Bug 1088200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.</Note>
    </Notes>
    <CVE>CVE-2019-10894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10894.html</URL>
        <Description>CVE-2019-10894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.</Note>
    </Notes>
    <CVE>CVE-2019-10895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10895.html</URL>
        <Description>CVE-2019-10895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes.</Note>
    </Notes>
    <CVE>CVE-2019-10896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10896.html</URL>
        <Description>CVE-2019-10896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the IEEE 802.11 dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-ieee80211.c by detecting cases in which the bit offset does not advance.</Note>
    </Notes>
    <CVE>CVE-2019-10897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10897.html</URL>
        <Description>CVE-2019-10897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the GSUP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gsm_gsup.c by rejecting an invalid Information Element length.</Note>
    </Notes>
    <CVE>CVE-2019-10898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10898.html</URL>
        <Description>CVE-2019-10898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.</Note>
    </Notes>
    <CVE>CVE-2019-10899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10899.html</URL>
        <Description>CVE-2019-10899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely.</Note>
    </Notes>
    <CVE>CVE-2019-10900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10900.html</URL>
        <Description>CVE-2019-10900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.</Note>
    </Notes>
    <CVE>CVE-2019-10901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10901.html</URL>
        <Description>CVE-2019-10901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely.</Note>
    </Notes>
    <CVE>CVE-2019-10902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10902.html</URL>
        <Description>CVE-2019-10902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.</Note>
    </Notes>
    <CVE>CVE-2019-10903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10903.html</URL>
        <Description>CVE-2019-10903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.</Note>
    </Notes>
    <CVE>CVE-2019-13619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13619.html</URL>
        <Description>CVE-2019-13619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141980</URL>
        <Description>SUSE Bug 1141980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.</Note>
    </Notes>
    <CVE>CVE-2019-16319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16319.html</URL>
        <Description>CVE-2019-16319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150690</URL>
        <Description>SUSE Bug 1150690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.</Note>
    </Notes>
    <CVE>CVE-2019-19553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19553.html</URL>
        <Description>CVE-2019-19553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158505</URL>
        <Description>SUSE Bug 1158505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.</Note>
    </Notes>
    <CVE>CVE-2019-5716</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5716.html</URL>
        <Description>CVE-2019-5716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121231</URL>
        <Description>SUSE Bug 1121231</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.</Note>
    </Notes>
    <CVE>CVE-2019-5717</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5717.html</URL>
        <Description>CVE-2019-5717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121232</URL>
        <Description>SUSE Bug 1121232</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.</Note>
    </Notes>
    <CVE>CVE-2019-5718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5718.html</URL>
        <Description>CVE-2019-5718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121233</URL>
        <Description>SUSE Bug 1121233</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.</Note>
    </Notes>
    <CVE>CVE-2019-5719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5719.html</URL>
        <Description>CVE-2019-5719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121234</URL>
        <Description>SUSE Bug 1121234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.</Note>
    </Notes>
    <CVE>CVE-2019-5721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5721.html</URL>
        <Description>CVE-2019-5721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121235</URL>
        <Description>SUSE Bug 1121235</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.</Note>
    </Notes>
    <CVE>CVE-2019-9208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9208.html</URL>
        <Description>CVE-2019-9208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127370</URL>
        <Description>SUSE Bug 1127370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.</Note>
    </Notes>
    <CVE>CVE-2019-9209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9209.html</URL>
        <Description>CVE-2019-9209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127369</URL>
        <Description>SUSE Bug 1127369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.</Note>
    </Notes>
    <CVE>CVE-2019-9214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9214.html</URL>
        <Description>CVE-2019-9214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127367</URL>
        <Description>SUSE Bug 1127367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion.</Note>
    </Notes>
    <CVE>CVE-2020-11647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11647.html</URL>
        <Description>CVE-2020-11647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169063</URL>
        <Description>SUSE Bug 1169063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.</Note>
    </Notes>
    <CVE>CVE-2020-13164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13164.html</URL>
        <Description>CVE-2020-13164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171899</URL>
        <Description>SUSE Bug 1171899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gvcp.c by ensuring that an offset increases in all situations.</Note>
    </Notes>
    <CVE>CVE-2020-15466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15466.html</URL>
        <Description>CVE-2020-15466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173606</URL>
        <Description>SUSE Bug 1173606</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.</Note>
    </Notes>
    <CVE>CVE-2020-17498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-17498.html</URL>
        <Description>CVE-2020-17498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175204</URL>
        <Description>SUSE Bug 1175204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.</Note>
    </Notes>
    <CVE>CVE-2020-25862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25862.html</URL>
        <Description>CVE-2020-25862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176909</URL>
        <Description>SUSE Bug 1176909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.</Note>
    </Notes>
    <CVE>CVE-2020-25863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25863.html</URL>
        <Description>CVE-2020-25863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176908</URL>
        <Description>SUSE Bug 1176908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.</Note>
    </Notes>
    <CVE>CVE-2020-25866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25866.html</URL>
        <Description>CVE-2020-25866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176910</URL>
        <Description>SUSE Bug 1176910</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.</Note>
    </Notes>
    <CVE>CVE-2020-26418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26418.html</URL>
        <Description>CVE-2020-26418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179930</URL>
        <Description>SUSE Bug 1179930</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.</Note>
    </Notes>
    <CVE>CVE-2020-26419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26419.html</URL>
        <Description>CVE-2020-26419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179931</URL>
        <Description>SUSE Bug 1179931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.</Note>
    </Notes>
    <CVE>CVE-2020-26420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26420.html</URL>
        <Description>CVE-2020-26420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179932</URL>
        <Description>SUSE Bug 1179932</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.</Note>
    </Notes>
    <CVE>CVE-2020-26421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26421.html</URL>
        <Description>CVE-2020-26421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179933</URL>
        <Description>SUSE Bug 1179933</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in QUIC dissector in Wireshark 3.4.0 to 3.4.1 allows denial of service via packet injection or crafted capture file</Note>
    </Notes>
    <CVE>CVE-2020-26422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26422.html</URL>
        <Description>CVE-2020-26422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180232</URL>
        <Description>SUSE Bug 1180232</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement.</Note>
    </Notes>
    <CVE>CVE-2020-26575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26575.html</URL>
        <Description>CVE-2020-26575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177406</URL>
        <Description>SUSE Bug 1177406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178290</URL>
        <Description>SUSE Bug 1178290</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was addressed in epan/dissectors/packet-gquic.c by correcting the implementation of offset advancement.</Note>
    </Notes>
    <CVE>CVE-2020-28030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28030.html</URL>
        <Description>CVE-2020-28030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178291</URL>
        <Description>SUSE Bug 1178291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.x before 3.2.1, the WASSP dissector could crash. This was addressed in epan/dissectors/packet-wassp.c by using &gt;= and &lt;= to resolve off-by-one errors.</Note>
    </Notes>
    <CVE>CVE-2020-7044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7044.html</URL>
        <Description>CVE-2020-7044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161052</URL>
        <Description>SUSE Bug 1161052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.</Note>
    </Notes>
    <CVE>CVE-2020-9428</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9428.html</URL>
        <Description>CVE-2020-9428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, the WireGuard dissector could crash. This was addressed in epan/dissectors/packet-wireguard.c by handling the situation where a certain data structure intentionally has a NULL value.</Note>
    </Notes>
    <CVE>CVE-2020-9429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9429.html</URL>
        <Description>CVE-2020-9429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.</Note>
    </Notes>
    <CVE>CVE-2020-9430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9430.html</URL>
        <Description>CVE-2020-9430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.</Note>
    </Notes>
    <CVE>CVE-2020-9431</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9431.html</URL>
        <Description>CVE-2020-9431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted capture file</Note>
    </Notes>
    <CVE>CVE-2021-22173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22173.html</URL>
        <Description>CVE-2021-22173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181598</URL>
        <Description>SUSE Bug 1181598</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Crash in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted capture file</Note>
    </Notes>
    <CVE>CVE-2021-22174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22174.html</URL>
        <Description>CVE-2021-22174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181599</URL>
        <Description>SUSE Bug 1181599</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.</Note>
    </Notes>
    <CVE>CVE-2021-22191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22191.html</URL>
        <Description>CVE-2021-22191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183353</URL>
        <Description>SUSE Bug 1183353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Excessive memory consumption in MS-WSP dissector in Wireshark 3.4.0 to 3.4.4 and 3.2.0 to 3.2.12 allows denial of service via packet injection or crafted capture file</Note>
    </Notes>
    <CVE>CVE-2021-22207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22207.html</URL>
        <Description>CVE-2021-22207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185128</URL>
        <Description>SUSE Bug 1185128</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Crash in DNP dissector in Wireshark 3.4.0 to 3.4.6 and 3.2.0 to 3.2.14 allows denial of service via packet injection or crafted capture file</Note>
    </Notes>
    <CVE>CVE-2021-22235</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libwireshark14-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwiretap11-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libwsutil12-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-3.4.8-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-3.4.8-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22235.html</URL>
        <Description>CVE-2021-22235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188375</URL>
        <Description>SUSE Bug 1188375</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
