<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for wireshark</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0362-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-03-19T19:19:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-03-19T19:19:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-03-19T19:19:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for wireshark</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for wireshark and libmaxminddb fixes the following issues:

Update wireshark to new major version 3.2.2 and introduce libmaxminddb for GeoIP support (bsc#1156288).

New features include:

- Added support for 111 new protocols, including WireGuard, LoRaWAN, TPM 2.0, 802.11ax and QUIC
- Improved support for existing protocols, like HTTP/2
- Improved analytics and usability functionalities

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-362</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0362-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1093733</URL>
      <Description>SUSE Bug 1093733</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094301</URL>
      <Description>SUSE Bug 1094301</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101776</URL>
      <Description>SUSE Bug 1101776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101777</URL>
      <Description>SUSE Bug 1101777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101786</URL>
      <Description>SUSE Bug 1101786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101788</URL>
      <Description>SUSE Bug 1101788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101791</URL>
      <Description>SUSE Bug 1101791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101794</URL>
      <Description>SUSE Bug 1101794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101800</URL>
      <Description>SUSE Bug 1101800</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101802</URL>
      <Description>SUSE Bug 1101802</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101804</URL>
      <Description>SUSE Bug 1101804</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101810</URL>
      <Description>SUSE Bug 1101810</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1106514</URL>
      <Description>SUSE Bug 1106514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111647</URL>
      <Description>SUSE Bug 1111647</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117740</URL>
      <Description>SUSE Bug 1117740</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121231</URL>
      <Description>SUSE Bug 1121231</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121232</URL>
      <Description>SUSE Bug 1121232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121233</URL>
      <Description>SUSE Bug 1121233</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121234</URL>
      <Description>SUSE Bug 1121234</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121235</URL>
      <Description>SUSE Bug 1121235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1127367</URL>
      <Description>SUSE Bug 1127367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1127369</URL>
      <Description>SUSE Bug 1127369</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1127370</URL>
      <Description>SUSE Bug 1127370</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1131941</URL>
      <Description>SUSE Bug 1131941</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1131945</URL>
      <Description>SUSE Bug 1131945</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136021</URL>
      <Description>SUSE Bug 1136021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1141980</URL>
      <Description>SUSE Bug 1141980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150690</URL>
      <Description>SUSE Bug 1150690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156288</URL>
      <Description>SUSE Bug 1156288</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158505</URL>
      <Description>SUSE Bug 1158505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161052</URL>
      <Description>SUSE Bug 1161052</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165241</URL>
      <Description>SUSE Bug 1165241</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165710</URL>
      <Description>SUSE Bug 1165710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/957624</URL>
      <Description>SUSE Bug 957624</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11354/</URL>
      <Description>SUSE CVE CVE-2018-11354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11355/</URL>
      <Description>SUSE CVE CVE-2018-11355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11356/</URL>
      <Description>SUSE CVE CVE-2018-11356 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11357/</URL>
      <Description>SUSE CVE CVE-2018-11357 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11358/</URL>
      <Description>SUSE CVE CVE-2018-11358 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11359/</URL>
      <Description>SUSE CVE CVE-2018-11359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11360/</URL>
      <Description>SUSE CVE CVE-2018-11360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11361/</URL>
      <Description>SUSE CVE CVE-2018-11361 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11362/</URL>
      <Description>SUSE CVE CVE-2018-11362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12086/</URL>
      <Description>SUSE CVE CVE-2018-12086 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14339/</URL>
      <Description>SUSE CVE CVE-2018-14339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14340/</URL>
      <Description>SUSE CVE CVE-2018-14340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14341/</URL>
      <Description>SUSE CVE CVE-2018-14341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14342/</URL>
      <Description>SUSE CVE CVE-2018-14342 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14343/</URL>
      <Description>SUSE CVE CVE-2018-14343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14344/</URL>
      <Description>SUSE CVE CVE-2018-14344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14367/</URL>
      <Description>SUSE CVE CVE-2018-14367 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14368/</URL>
      <Description>SUSE CVE CVE-2018-14368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14369/</URL>
      <Description>SUSE CVE CVE-2018-14369 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14370/</URL>
      <Description>SUSE CVE CVE-2018-14370 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16056/</URL>
      <Description>SUSE CVE CVE-2018-16056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16057/</URL>
      <Description>SUSE CVE CVE-2018-16057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16058/</URL>
      <Description>SUSE CVE CVE-2018-16058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18225/</URL>
      <Description>SUSE CVE CVE-2018-18225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18226/</URL>
      <Description>SUSE CVE CVE-2018-18226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18227/</URL>
      <Description>SUSE CVE CVE-2018-18227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19622/</URL>
      <Description>SUSE CVE CVE-2018-19622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19623/</URL>
      <Description>SUSE CVE CVE-2018-19623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19624/</URL>
      <Description>SUSE CVE CVE-2018-19624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19625/</URL>
      <Description>SUSE CVE CVE-2018-19625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19626/</URL>
      <Description>SUSE CVE CVE-2018-19626 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19627/</URL>
      <Description>SUSE CVE CVE-2018-19627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19628/</URL>
      <Description>SUSE CVE CVE-2018-19628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10894/</URL>
      <Description>SUSE CVE CVE-2019-10894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10895/</URL>
      <Description>SUSE CVE CVE-2019-10895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10896/</URL>
      <Description>SUSE CVE CVE-2019-10896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10897/</URL>
      <Description>SUSE CVE CVE-2019-10897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10898/</URL>
      <Description>SUSE CVE CVE-2019-10898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10899/</URL>
      <Description>SUSE CVE CVE-2019-10899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10900/</URL>
      <Description>SUSE CVE CVE-2019-10900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10901/</URL>
      <Description>SUSE CVE CVE-2019-10901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10902/</URL>
      <Description>SUSE CVE CVE-2019-10902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10903/</URL>
      <Description>SUSE CVE CVE-2019-10903 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13619/</URL>
      <Description>SUSE CVE CVE-2019-13619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16319/</URL>
      <Description>SUSE CVE CVE-2019-16319 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19553/</URL>
      <Description>SUSE CVE CVE-2019-19553 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5716/</URL>
      <Description>SUSE CVE CVE-2019-5716 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5717/</URL>
      <Description>SUSE CVE CVE-2019-5717 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5718/</URL>
      <Description>SUSE CVE CVE-2019-5718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5719/</URL>
      <Description>SUSE CVE CVE-2019-5719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5721/</URL>
      <Description>SUSE CVE CVE-2019-5721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9208/</URL>
      <Description>SUSE CVE CVE-2019-9208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9209/</URL>
      <Description>SUSE CVE CVE-2019-9209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9214/</URL>
      <Description>SUSE CVE CVE-2019-9214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7044/</URL>
      <Description>SUSE CVE CVE-2020-7044 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9428/</URL>
      <Description>SUSE CVE CVE-2020-9428 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9429/</URL>
      <Description>SUSE CVE CVE-2020-9429 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9430/</URL>
      <Description>SUSE CVE CVE-2020-9430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9431/</URL>
      <Description>SUSE CVE CVE-2020-9431 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmaxminddb-devel-1.4.2-lp151.3.3.1">
      <FullProductName ProductID="libmaxminddb-devel-1.4.2-lp151.3.3.1">libmaxminddb-devel-1.4.2-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmaxminddb0-1.4.2-lp151.3.3.1">
      <FullProductName ProductID="libmaxminddb0-1.4.2-lp151.3.3.1">libmaxminddb0-1.4.2-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmaxminddb0-32bit-1.4.2-lp151.3.3.1">
      <FullProductName ProductID="libmaxminddb0-32bit-1.4.2-lp151.3.3.1">libmaxminddb0-32bit-1.4.2-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libspandsp2-0.0.6-lp151.3.3.1">
      <FullProductName ProductID="libspandsp2-0.0.6-lp151.3.3.1">libspandsp2-0.0.6-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libspandsp2-32bit-0.0.6-lp151.3.3.1">
      <FullProductName ProductID="libspandsp2-32bit-0.0.6-lp151.3.3.1">libspandsp2-32bit-0.0.6-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwireshark13-3.2.2-lp151.2.9.1">
      <FullProductName ProductID="libwireshark13-3.2.2-lp151.2.9.1">libwireshark13-3.2.2-lp151.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwiretap10-3.2.2-lp151.2.9.1">
      <FullProductName ProductID="libwiretap10-3.2.2-lp151.2.9.1">libwiretap10-3.2.2-lp151.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwsutil11-3.2.2-lp151.2.9.1">
      <FullProductName ProductID="libwsutil11-3.2.2-lp151.2.9.1">libwsutil11-3.2.2-lp151.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mmdblookup-1.4.2-lp151.3.3.1">
      <FullProductName ProductID="mmdblookup-1.4.2-lp151.3.3.1">mmdblookup-1.4.2-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spandsp-devel-0.0.6-lp151.3.3.1">
      <FullProductName ProductID="spandsp-devel-0.0.6-lp151.3.3.1">spandsp-devel-0.0.6-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spandsp-doc-0.0.6-lp151.3.3.1">
      <FullProductName ProductID="spandsp-doc-0.0.6-lp151.3.3.1">spandsp-doc-0.0.6-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-3.2.2-lp151.2.9.1">
      <FullProductName ProductID="wireshark-3.2.2-lp151.2.9.1">wireshark-3.2.2-lp151.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-devel-3.2.2-lp151.2.9.1">
      <FullProductName ProductID="wireshark-devel-3.2.2-lp151.2.9.1">wireshark-devel-3.2.2-lp151.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-ui-qt-3.2.2-lp151.2.9.1">
      <FullProductName ProductID="wireshark-ui-qt-3.2.2-lp151.2.9.1">wireshark-ui-qt-3.2.2-lp151.2.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmaxminddb-devel-1.4.2-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1">libmaxminddb-devel-1.4.2-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmaxminddb0-1.4.2-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1">libmaxminddb0-1.4.2-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmaxminddb0-32bit-1.4.2-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1">libmaxminddb0-32bit-1.4.2-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libspandsp2-0.0.6-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1">libspandsp2-0.0.6-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libspandsp2-32bit-0.0.6-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1">libspandsp2-32bit-0.0.6-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwireshark13-3.2.2-lp151.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1">libwireshark13-3.2.2-lp151.2.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwiretap10-3.2.2-lp151.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1">libwiretap10-3.2.2-lp151.2.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwsutil11-3.2.2-lp151.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1">libwsutil11-3.2.2-lp151.2.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mmdblookup-1.4.2-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1">mmdblookup-1.4.2-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="spandsp-devel-0.0.6-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1">spandsp-devel-0.0.6-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="spandsp-doc-0.0.6-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1">spandsp-doc-0.0.6-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-3.2.2-lp151.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1">wireshark-3.2.2-lp151.2.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-devel-3.2.2-lp151.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1">wireshark-devel-3.2.2-lp151.2.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-ui-qt-3.2.2-lp151.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1">wireshark-ui-qt-3.2.2-lp151.2.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.</Note>
    </Notes>
    <CVE>CVE-2018-11354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11354.html</URL>
        <Description>CVE-2018-11354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.</Note>
    </Notes>
    <CVE>CVE-2018-11355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11355.html</URL>
        <Description>CVE-2018-11355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.</Note>
    </Notes>
    <CVE>CVE-2018-11356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11356.html</URL>
        <Description>CVE-2018-11356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.</Note>
    </Notes>
    <CVE>CVE-2018-11357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11357.html</URL>
        <Description>CVE-2018-11357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.</Note>
    </Notes>
    <CVE>CVE-2018-11358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11358.html</URL>
        <Description>CVE-2018-11358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2018-11359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11359.html</URL>
        <Description>CVE-2018-11359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2018-11360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11360.html</URL>
        <Description>CVE-2018-11360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.</Note>
    </Notes>
    <CVE>CVE-2018-11361</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11361.html</URL>
        <Description>CVE-2018-11361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.</Note>
    </Notes>
    <CVE>CVE-2018-11362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11362.html</URL>
        <Description>CVE-2018-11362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094301</URL>
        <Description>SUSE Bug 1094301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.</Note>
    </Notes>
    <CVE>CVE-2018-12086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12086.html</URL>
        <Description>CVE-2018-12086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.</Note>
    </Notes>
    <CVE>CVE-2018-14339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14339.html</URL>
        <Description>CVE-2018-14339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101810</URL>
        <Description>SUSE Bug 1101810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-14340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14340.html</URL>
        <Description>CVE-2018-14340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101804</URL>
        <Description>SUSE Bug 1101804</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.</Note>
    </Notes>
    <CVE>CVE-2018-14341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14341.html</URL>
        <Description>CVE-2018-14341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101776</URL>
        <Description>SUSE Bug 1101776</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.</Note>
    </Notes>
    <CVE>CVE-2018-14342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14342.html</URL>
        <Description>CVE-2018-14342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101777</URL>
        <Description>SUSE Bug 1101777</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.</Note>
    </Notes>
    <CVE>CVE-2018-14343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14343.html</URL>
        <Description>CVE-2018-14343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101786</URL>
        <Description>SUSE Bug 1101786</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-14344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14344.html</URL>
        <Description>CVE-2018-14344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101788</URL>
        <Description>SUSE Bug 1101788</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.</Note>
    </Notes>
    <CVE>CVE-2018-14367</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14367.html</URL>
        <Description>CVE-2018-14367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101791</URL>
        <Description>SUSE Bug 1101791</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.</Note>
    </Notes>
    <CVE>CVE-2018-14368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14368.html</URL>
        <Description>CVE-2018-14368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101794</URL>
        <Description>SUSE Bug 1101794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.</Note>
    </Notes>
    <CVE>CVE-2018-14369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14369.html</URL>
        <Description>CVE-2018-14369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101800</URL>
        <Description>SUSE Bug 1101800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-14370</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14370.html</URL>
        <Description>CVE-2018-14370</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101802</URL>
        <Description>SUSE Bug 1101802</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.</Note>
    </Notes>
    <CVE>CVE-2018-16056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16056.html</URL>
        <Description>CVE-2018-16056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106514</URL>
        <Description>SUSE Bug 1106514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.</Note>
    </Notes>
    <CVE>CVE-2018-16057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16057.html</URL>
        <Description>CVE-2018-16057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106514</URL>
        <Description>SUSE Bug 1106514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.</Note>
    </Notes>
    <CVE>CVE-2018-16058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16058.html</URL>
        <Description>CVE-2018-16058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106514</URL>
        <Description>SUSE Bug 1106514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.3, the CoAP dissector could crash. This was addressed in epan/dissectors/packet-coap.c by ensuring that the piv length is correctly computed.</Note>
    </Notes>
    <CVE>CVE-2018-18225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18225.html</URL>
        <Description>CVE-2018-18225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.3, the Steam IHS Discovery dissector could consume system memory. This was addressed in epan/dissectors/packet-steam-ihs-discovery.c by changing the memory-management approach.</Note>
    </Notes>
    <CVE>CVE-2018-18226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18226.html</URL>
        <Description>CVE-2018-18226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.</Note>
    </Notes>
    <CVE>CVE-2018-18227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18227.html</URL>
        <Description>CVE-2018-18227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111647</URL>
        <Description>SUSE Bug 1111647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.</Note>
    </Notes>
    <CVE>CVE-2018-19622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19622.html</URL>
        <Description>CVE-2018-19622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.</Note>
    </Notes>
    <CVE>CVE-2018-19623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19623.html</URL>
        <Description>CVE-2018-19623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2018-19624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19624.html</URL>
        <Description>CVE-2018-19624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-19625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19625.html</URL>
        <Description>CVE-2018-19625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.</Note>
    </Notes>
    <CVE>CVE-2018-19626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19626.html</URL>
        <Description>CVE-2018-19626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary.</Note>
    </Notes>
    <CVE>CVE-2018-19627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19627.html</URL>
        <Description>CVE-2018-19627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.4, the ZigBee ZCL dissector could crash. This was addressed in epan/dissectors/packet-zbee-zcl-lighting.c by preventing a divide-by-zero error.</Note>
    </Notes>
    <CVE>CVE-2018-19628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19628.html</URL>
        <Description>CVE-2018-19628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117740</URL>
        <Description>SUSE Bug 1117740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.</Note>
    </Notes>
    <CVE>CVE-2019-10894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10894.html</URL>
        <Description>CVE-2019-10894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.</Note>
    </Notes>
    <CVE>CVE-2019-10895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10895.html</URL>
        <Description>CVE-2019-10895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes.</Note>
    </Notes>
    <CVE>CVE-2019-10896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10896.html</URL>
        <Description>CVE-2019-10896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the IEEE 802.11 dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-ieee80211.c by detecting cases in which the bit offset does not advance.</Note>
    </Notes>
    <CVE>CVE-2019-10897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10897.html</URL>
        <Description>CVE-2019-10897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the GSUP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gsm_gsup.c by rejecting an invalid Information Element length.</Note>
    </Notes>
    <CVE>CVE-2019-10898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10898.html</URL>
        <Description>CVE-2019-10898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.</Note>
    </Notes>
    <CVE>CVE-2019-10899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10899.html</URL>
        <Description>CVE-2019-10899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely.</Note>
    </Notes>
    <CVE>CVE-2019-10900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10900.html</URL>
        <Description>CVE-2019-10900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.</Note>
    </Notes>
    <CVE>CVE-2019-10901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10901.html</URL>
        <Description>CVE-2019-10901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely.</Note>
    </Notes>
    <CVE>CVE-2019-10902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10902.html</URL>
        <Description>CVE-2019-10902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.</Note>
    </Notes>
    <CVE>CVE-2019-10903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10903.html</URL>
        <Description>CVE-2019-10903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131941</URL>
        <Description>SUSE Bug 1131941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131943</URL>
        <Description>SUSE Bug 1131943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131945</URL>
        <Description>SUSE Bug 1131945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.</Note>
    </Notes>
    <CVE>CVE-2019-13619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13619.html</URL>
        <Description>CVE-2019-13619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141980</URL>
        <Description>SUSE Bug 1141980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.</Note>
    </Notes>
    <CVE>CVE-2019-16319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16319.html</URL>
        <Description>CVE-2019-16319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150690</URL>
        <Description>SUSE Bug 1150690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.</Note>
    </Notes>
    <CVE>CVE-2019-19553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19553.html</URL>
        <Description>CVE-2019-19553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158505</URL>
        <Description>SUSE Bug 1158505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.</Note>
    </Notes>
    <CVE>CVE-2019-5716</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5716.html</URL>
        <Description>CVE-2019-5716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121231</URL>
        <Description>SUSE Bug 1121231</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.</Note>
    </Notes>
    <CVE>CVE-2019-5717</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5717.html</URL>
        <Description>CVE-2019-5717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121232</URL>
        <Description>SUSE Bug 1121232</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.</Note>
    </Notes>
    <CVE>CVE-2019-5718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5718.html</URL>
        <Description>CVE-2019-5718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121233</URL>
        <Description>SUSE Bug 1121233</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.</Note>
    </Notes>
    <CVE>CVE-2019-5719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5719.html</URL>
        <Description>CVE-2019-5719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121234</URL>
        <Description>SUSE Bug 1121234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.</Note>
    </Notes>
    <CVE>CVE-2019-5721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5721.html</URL>
        <Description>CVE-2019-5721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121235</URL>
        <Description>SUSE Bug 1121235</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.</Note>
    </Notes>
    <CVE>CVE-2019-9208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9208.html</URL>
        <Description>CVE-2019-9208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127370</URL>
        <Description>SUSE Bug 1127370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.</Note>
    </Notes>
    <CVE>CVE-2019-9209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9209.html</URL>
        <Description>CVE-2019-9209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127369</URL>
        <Description>SUSE Bug 1127369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.</Note>
    </Notes>
    <CVE>CVE-2019-9214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9214.html</URL>
        <Description>CVE-2019-9214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127367</URL>
        <Description>SUSE Bug 1127367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.x before 3.2.1, the WASSP dissector could crash. This was addressed in epan/dissectors/packet-wassp.c by using &gt;= and &lt;= to resolve off-by-one errors.</Note>
    </Notes>
    <CVE>CVE-2020-7044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7044.html</URL>
        <Description>CVE-2020-7044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161052</URL>
        <Description>SUSE Bug 1161052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.</Note>
    </Notes>
    <CVE>CVE-2020-9428</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9428.html</URL>
        <Description>CVE-2020-9428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, the WireGuard dissector could crash. This was addressed in epan/dissectors/packet-wireguard.c by handling the situation where a certain data structure intentionally has a NULL value.</Note>
    </Notes>
    <CVE>CVE-2020-9429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9429.html</URL>
        <Description>CVE-2020-9429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.</Note>
    </Notes>
    <CVE>CVE-2020-9430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9430.html</URL>
        <Description>CVE-2020-9430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.</Note>
    </Notes>
    <CVE>CVE-2020-9431</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libmaxminddb-devel-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libmaxminddb0-32bit-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libspandsp2-32bit-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwireshark13-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwiretap10-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwsutil11-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:mmdblookup-1.4.2-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-devel-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spandsp-doc-0.0.6-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-devel-3.2.2-lp151.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:wireshark-ui-qt-3.2.2-lp151.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9431.html</URL>
        <Description>CVE-2020-9431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165241</URL>
        <Description>SUSE Bug 1165241</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
