<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tcpdump, libpcap</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1199-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-05-08T11:30:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-05-08T11:30:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-05-08T11:30:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tcpdump, libpcap</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for tcpdump to version 4.9.0 and libpcap to version 1.8.1 fixes the several issues.

These security issues were fixed in tcpdump:

- CVE-2016-7922: The AH parser in tcpdump had a buffer overflow in print-ah.c:ah_print() (bsc#1020940).
- CVE-2016-7923: The ARP parser in tcpdump had a buffer overflow in print-arp.c:arp_print() (bsc#1020940).
- CVE-2016-7924: The ATM parser in tcpdump had a buffer overflow in print-atm.c:oam_print() (bsc#1020940).
- CVE-2016-7925: The compressed SLIP parser in tcpdump had a buffer overflow in print-sl.c:sl_if_print() (bsc#1020940).
- CVE-2016-7926: The Ethernet parser in tcpdump had a buffer overflow in print-ether.c:ethertype_print() (bsc#1020940).
- CVE-2016-7927: The IEEE 802.11 parser in tcpdump had a buffer overflow in print-802_11.c:ieee802_11_radio_print() (bsc#1020940).
- CVE-2016-7928: The IPComp parser in tcpdump had a buffer overflow in print-ipcomp.c:ipcomp_print() (bsc#1020940).
- CVE-2016-7929: The Juniper PPPoE ATM parser in tcpdump had a buffer overflow in print-juniper.c:juniper_parse_header() (bsc#1020940).
- CVE-2016-7930: The LLC/SNAP parser in tcpdump had a buffer overflow in print-llc.c:llc_print() (bsc#1020940).
- CVE-2016-7931: The MPLS parser in tcpdump had a buffer overflow in print-mpls.c:mpls_print() (bsc#1020940).
- CVE-2016-7932: The PIM parser in tcpdump had a buffer overflow in print-pim.c:pimv2_check_checksum() (bsc#1020940).
- CVE-2016-7933: The PPP parser in tcpdump had a buffer overflow in print-ppp.c:ppp_hdlc_if_print() (bsc#1020940).
- CVE-2016-7934: The RTCP parser in tcpdump had a buffer overflow in print-udp.c:rtcp_print() (bsc#1020940).
- CVE-2016-7935: The RTP parser in tcpdump had a buffer overflow in print-udp.c:rtp_print() (bsc#1020940).
- CVE-2016-7936: The UDP parser in tcpdump had a buffer overflow in print-udp.c:udp_print() (bsc#1020940).
- CVE-2016-7937: The VAT parser in tcpdump had a buffer overflow in print-udp.c:vat_print() (bsc#1020940).
- CVE-2016-7938: The ZeroMQ parser in tcpdump had an integer overflow in print-zeromq.c:zmtp1_print_frame() (bsc#1020940).
- CVE-2016-7939: The GRE parser in tcpdump had a buffer overflow in print-gre.c, multiple functions (bsc#1020940).
- CVE-2016-7940: The STP parser in tcpdump had a buffer overflow in print-stp.c, multiple functions (bsc#1020940).
- CVE-2016-7973: The AppleTalk parser in tcpdump had a buffer overflow in print-atalk.c, multiple functions (bsc#1020940).
- CVE-2016-7974: The IP parser in tcpdump had a buffer overflow in print-ip.c, multiple functions (bsc#1020940).
- CVE-2016-7975: The TCP parser in tcpdump had a buffer overflow in print-tcp.c:tcp_print() (bsc#1020940).
- CVE-2016-7983: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2016-7984: The TFTP parser in tcpdump had a buffer overflow in print-tftp.c:tftp_print() (bsc#1020940).
- CVE-2016-7985: The CALM FAST parser in tcpdump had a buffer overflow in print-calm-fast.c:calm_fast_print() (bsc#1020940).
- CVE-2016-7986: The GeoNetworking parser in tcpdump had a buffer overflow in print-geonet.c, multiple functions (bsc#1020940).
- CVE-2016-7992: The Classical IP over ATM parser in tcpdump had a buffer overflow in print-cip.c:cip_if_print() (bsc#1020940).
- CVE-2016-7993: A bug in util-print.c:relts_print() in tcpdump could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) (bsc#1020940).
- CVE-2016-8574: The FRF.15 parser in tcpdump had a buffer overflow in print-fr.c:frf15_print() (bsc#1020940).
- CVE-2016-8575: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482 (bsc#1020940).
- CVE-2017-5202: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2017-5203: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2017-5204: The IPv6 parser in tcpdump had a buffer overflow in print-ip6.c:ip6_print() (bsc#1020940).
- CVE-2017-5205: The ISAKMP parser in tcpdump had a buffer overflow in print-isakmp.c:ikev2_e_print() (bsc#1020940).
- CVE-2017-5341: The OTV parser in tcpdump had a buffer overflow in print-otv.c:otv_print() (bsc#1020940).
- CVE-2017-5342: In tcpdump a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print() (bsc#1020940).
- CVE-2017-5482: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575 (bsc#1020940).
- CVE-2017-5483: The SNMP parser in tcpdump had a buffer overflow in print-snmp.c:asn1_parse() (bsc#1020940).
- CVE-2017-5484: The ATM parser in tcpdump had a buffer overflow in print-atm.c:sig_print() (bsc#1020940).
- CVE-2017-5485: The ISO CLNS parser in tcpdump had a buffer overflow in addrtoname.c:lookup_nsap() (bsc#1020940).
- CVE-2017-5486: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2015-3138: Fixed potential denial of service in print-wb.c (bsc#927637).
- CVE-2015-0261: Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value (bsc#922220).
- CVE-2015-2153: The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU) (bsc#922221).
- CVE-2015-2154: The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value (bsc#922222).
- CVE-2015-2155: The force printer in tcpdump allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors (bsc#922223).
- CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump 3.9.6 when in verbose mode, allowed remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame (bsc#905870).
- CVE-2014-8768: Multiple Integer underflows in the geonet_print function in tcpdump when run in verbose mode, allowed remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame (bsc#905871).
- CVE-2014-8769: tcpdump might have allowed remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access (bsc#905872).

These non-security issues were fixed in tcpdump:

- PPKI to Router Protocol: Fix Segmentation Faults and other problems
- RPKI to Router Protocol: print strings with fn_printn()
- Added a short option '#', same as long option '--number'
- nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL, DHCPv6 enhancements/fixes
- M3UA decode added.
- Added bittok2str().
- A number of unaligned access faults fixed
- The -A flag does not consider CR to be printable anymore
- fx.lebail took over coverity baby sitting
- Default snapshot size increased to 256K for accomodate USB captures

These non-security issues were fixed in libpcap:

- Provide a -devel-static subpackage that contains the static
  libraries and all the extra dependencies which are not needed
  for dynamic linking.
- Fix handling of packet count in the TPACKET_V3 inner loop
- Filter out duplicate looped back CAN frames.
- Fix the handling of loopback filters for IPv6 packets.
- Add a link-layer header type for RDS (IEC 62106) groups.
- Handle all CAN captures with pcap-linux.c, in cooked mode.
- Removes the need for the 'host-endian' link-layer header type.
- Have separate DLTs for big-endian and host-endian SocketCAN headers.
- Properly check for sock_recv() errors.
- Re-impose some of Winsock's limitations on sock_recv().
- Replace sprintf() with pcap_snprintf().
- Fix signature of pcap_stats_ex_remote().
- Have rpcap_remoteact_getsock() return a SOCKET and supply an 'is active' flag.
- Clean up {DAG, Septel, Myricom SNF}-only builds.
- pcap_create_interface() needs the interface name on Linux.
- Clean up hardware time stamp support: the 'any' device does not support any time stamp types.
- Recognize 802.1ad nested VLAN tag in vlan filter.
- Support for filtering Geneve encapsulated packets.
- Fix handling of zones for BPF on Solaris
- Added bpf_filter1() with extensions
- EBUSY can now be returned by SNFv3 code.
- Don't crash on filters testing a non-existent link-layer type field.
- Fix sending in non-blocking mode on Linux with memory-mapped capture.
- Fix timestamps when reading pcap-ng files on big-endian machines.
- Fixes for byte order issues with NFLOG captures
- Handle using cooked mode for DLT_NETLINK in activate_new().

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1199-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-1.8.1-7.3.1">
      <FullProductName ProductID="libpcap-1.8.1-7.3.1">libpcap-1.8.1-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-devel-1.8.1-7.3.1">
      <FullProductName ProductID="libpcap-devel-1.8.1-7.3.1">libpcap-devel-1.8.1-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-devel-32bit-1.8.1-7.3.1">
      <FullProductName ProductID="libpcap-devel-32bit-1.8.1-7.3.1">libpcap-devel-32bit-1.8.1-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-devel-static-1.8.1-7.3.1">
      <FullProductName ProductID="libpcap-devel-static-1.8.1-7.3.1">libpcap-devel-static-1.8.1-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap1-1.8.1-7.3.1">
      <FullProductName ProductID="libpcap1-1.8.1-7.3.1">libpcap1-1.8.1-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap1-32bit-1.8.1-7.3.1">
      <FullProductName ProductID="libpcap1-32bit-1.8.1-7.3.1">libpcap1-32bit-1.8.1-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tcpdump-4.9.0-6.3.1">
      <FullProductName ProductID="tcpdump-4.9.0-6.3.1">tcpdump-4.9.0-6.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpcap-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libpcap-1.8.1-7.3.1">libpcap-1.8.1-7.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1">libpcap-devel-1.8.1-7.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-32bit-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1">libpcap-devel-32bit-1.8.1-7.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-static-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1">libpcap-devel-static-1.8.1-7.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1">libpcap1-1.8.1-7.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-32bit-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1">libpcap1-32bit-1.8.1-7.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tcpdump-4.9.0-6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1">tcpdump-4.9.0-6.3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libpcap-1.8.1-7.3.1">libpcap-1.8.1-7.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1">libpcap-devel-1.8.1-7.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-32bit-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1">libpcap-devel-32bit-1.8.1-7.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-static-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1">libpcap-devel-static-1.8.1-7.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1">libpcap1-1.8.1-7.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-32bit-1.8.1-7.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1">libpcap1-32bit-1.8.1-7.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tcpdump-4.9.0-6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1">tcpdump-4.9.0-6.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.</Note>
    </Notes>
    <CVE>CVE-2014-8767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8767.html</URL>
        <Description>CVE-2014-8767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905870</URL>
        <Description>SUSE Bug 905870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905871</URL>
        <Description>SUSE Bug 905871</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.</Note>
    </Notes>
    <CVE>CVE-2014-8768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8768.html</URL>
        <Description>CVE-2014-8768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905871</URL>
        <Description>SUSE Bug 905871</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.</Note>
    </Notes>
    <CVE>CVE-2014-8769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8769.html</URL>
        <Description>CVE-2014-8769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905871</URL>
        <Description>SUSE Bug 905871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905872</URL>
        <Description>SUSE Bug 905872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.</Note>
    </Notes>
    <CVE>CVE-2015-0261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0261.html</URL>
        <Description>CVE-2015-0261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922220</URL>
        <Description>SUSE Bug 922220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).</Note>
    </Notes>
    <CVE>CVE-2015-2153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2153.html</URL>
        <Description>CVE-2015-2153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922221</URL>
        <Description>SUSE Bug 922221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922222</URL>
        <Description>SUSE Bug 922222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922223</URL>
        <Description>SUSE Bug 922223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.</Note>
    </Notes>
    <CVE>CVE-2015-2154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2154.html</URL>
        <Description>CVE-2015-2154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922222</URL>
        <Description>SUSE Bug 922222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2155.html</URL>
        <Description>CVE-2015-2155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922220</URL>
        <Description>SUSE Bug 922220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922221</URL>
        <Description>SUSE Bug 922221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922222</URL>
        <Description>SUSE Bug 922222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922223</URL>
        <Description>SUSE Bug 922223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).</Note>
    </Notes>
    <CVE>CVE-2015-3138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3138.html</URL>
        <Description>CVE-2015-3138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927637</URL>
        <Description>SUSE Bug 927637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().</Note>
    </Notes>
    <CVE>CVE-2016-7922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7922.html</URL>
        <Description>CVE-2016-7922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7923.html</URL>
        <Description>CVE-2016-7923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().</Note>
    </Notes>
    <CVE>CVE-2016-7924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7924.html</URL>
        <Description>CVE-2016-7924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().</Note>
    </Notes>
    <CVE>CVE-2016-7925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7925.html</URL>
        <Description>CVE-2016-7925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().</Note>
    </Notes>
    <CVE>CVE-2016-7926</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7926.html</URL>
        <Description>CVE-2016-7926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().</Note>
    </Notes>
    <CVE>CVE-2016-7927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7927.html</URL>
        <Description>CVE-2016-7927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7928.html</URL>
        <Description>CVE-2016-7928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().</Note>
    </Notes>
    <CVE>CVE-2016-7929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7929.html</URL>
        <Description>CVE-2016-7929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().</Note>
    </Notes>
    <CVE>CVE-2016-7930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7930.html</URL>
        <Description>CVE-2016-7930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().</Note>
    </Notes>
    <CVE>CVE-2016-7931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7931.html</URL>
        <Description>CVE-2016-7931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().</Note>
    </Notes>
    <CVE>CVE-2016-7932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7932.html</URL>
        <Description>CVE-2016-7932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().</Note>
    </Notes>
    <CVE>CVE-2016-7933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7933.html</URL>
        <Description>CVE-2016-7933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7934.html</URL>
        <Description>CVE-2016-7934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7935.html</URL>
        <Description>CVE-2016-7935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7936.html</URL>
        <Description>CVE-2016-7936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().</Note>
    </Notes>
    <CVE>CVE-2016-7937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7937.html</URL>
        <Description>CVE-2016-7937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().</Note>
    </Notes>
    <CVE>CVE-2016-7938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7938.html</URL>
        <Description>CVE-2016-7938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7939.html</URL>
        <Description>CVE-2016-7939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7940</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7940.html</URL>
        <Description>CVE-2016-7940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7973.html</URL>
        <Description>CVE-2016-7973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7974.html</URL>
        <Description>CVE-2016-7974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7975.html</URL>
        <Description>CVE-2016-7975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7983.html</URL>
        <Description>CVE-2016-7983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().</Note>
    </Notes>
    <CVE>CVE-2016-7984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7984.html</URL>
        <Description>CVE-2016-7984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().</Note>
    </Notes>
    <CVE>CVE-2016-7985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7985.html</URL>
        <Description>CVE-2016-7985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.</Note>
    </Notes>
    <CVE>CVE-2016-7986</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7986.html</URL>
        <Description>CVE-2016-7986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().</Note>
    </Notes>
    <CVE>CVE-2016-7992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7992.html</URL>
        <Description>CVE-2016-7992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).</Note>
    </Notes>
    <CVE>CVE-2016-7993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7993.html</URL>
        <Description>CVE-2016-7993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().</Note>
    </Notes>
    <CVE>CVE-2016-8574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8574.html</URL>
        <Description>CVE-2016-8574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.</Note>
    </Notes>
    <CVE>CVE-2016-8575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8575.html</URL>
        <Description>CVE-2016-8575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().</Note>
    </Notes>
    <CVE>CVE-2017-5202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5202.html</URL>
        <Description>CVE-2017-5202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().</Note>
    </Notes>
    <CVE>CVE-2017-5203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5203.html</URL>
        <Description>CVE-2017-5203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().</Note>
    </Notes>
    <CVE>CVE-2017-5204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5204.html</URL>
        <Description>CVE-2017-5204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().</Note>
    </Notes>
    <CVE>CVE-2017-5205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5205.html</URL>
        <Description>CVE-2017-5205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().</Note>
    </Notes>
    <CVE>CVE-2017-5341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5341.html</URL>
        <Description>CVE-2017-5341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().</Note>
    </Notes>
    <CVE>CVE-2017-5342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5342.html</URL>
        <Description>CVE-2017-5342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.</Note>
    </Notes>
    <CVE>CVE-2017-5482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5482.html</URL>
        <Description>CVE-2017-5482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().</Note>
    </Notes>
    <CVE>CVE-2017-5483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5483.html</URL>
        <Description>CVE-2017-5483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().</Note>
    </Notes>
    <CVE>CVE-2017-5484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5484.html</URL>
        <Description>CVE-2017-5484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().</Note>
    </Notes>
    <CVE>CVE-2017-5485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5485.html</URL>
        <Description>CVE-2017-5485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().</Note>
    </Notes>
    <CVE>CVE-2017-5486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tcpdump-4.9.0-6.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap-devel-static-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libpcap1-32bit-1.8.1-7.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.0-6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5486.html</URL>
        <Description>CVE-2017-5486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020940</URL>
        <Description>SUSE Bug 1020940</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
