{"affected":[{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","libpcap1-32bit":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","libpcap1-32bit":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","libpcap1-32bit":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","libpcap1-32bit":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap-devel":"1.8.1-9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap-devel":"1.8.1-9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1":"1.8.1-9.1","tcpdump":"4.9.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0-13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1-32bit":"1.8.1-9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP1","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpcap1-32bit":"1.8.1-9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP2","name":"libpcap","purl":"pkg:rpm/suse/libpcap&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.1-9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for tcpdump to version 4.9.0 and libpcap to version 1.8.1 fixes the several issues.\n\nThese security issues were fixed in tcpdump:\n\n- CVE-2016-7922: The AH parser in tcpdump had a buffer overflow in print-ah.c:ah_print() (bsc#1020940).\n- CVE-2016-7923: The ARP parser in tcpdump had a buffer overflow in print-arp.c:arp_print() (bsc#1020940).\n- CVE-2016-7924: The ATM parser in tcpdump had a buffer overflow in print-atm.c:oam_print() (bsc#1020940).\n- CVE-2016-7925: The compressed SLIP parser in tcpdump had a buffer overflow in print-sl.c:sl_if_print() (bsc#1020940).\n- CVE-2016-7926: The Ethernet parser in tcpdump had a buffer overflow in print-ether.c:ethertype_print() (bsc#1020940).\n- CVE-2016-7927: The IEEE 802.11 parser in tcpdump had a buffer overflow in print-802_11.c:ieee802_11_radio_print() (bsc#1020940).\n- CVE-2016-7928: The IPComp parser in tcpdump had a buffer overflow in print-ipcomp.c:ipcomp_print() (bsc#1020940).\n- CVE-2016-7929: The Juniper PPPoE ATM parser in tcpdump had a buffer overflow in print-juniper.c:juniper_parse_header() (bsc#1020940).\n- CVE-2016-7930: The LLC/SNAP parser in tcpdump had a buffer overflow in print-llc.c:llc_print() (bsc#1020940).\n- CVE-2016-7931: The MPLS parser in tcpdump had a buffer overflow in print-mpls.c:mpls_print() (bsc#1020940).\n- CVE-2016-7932: The PIM parser in tcpdump had a buffer overflow in print-pim.c:pimv2_check_checksum() (bsc#1020940).\n- CVE-2016-7933: The PPP parser in tcpdump had a buffer overflow in print-ppp.c:ppp_hdlc_if_print() (bsc#1020940).\n- CVE-2016-7934: The RTCP parser in tcpdump had a buffer overflow in print-udp.c:rtcp_print() (bsc#1020940).\n- CVE-2016-7935: The RTP parser in tcpdump had a buffer overflow in print-udp.c:rtp_print() (bsc#1020940).\n- CVE-2016-7936: The UDP parser in tcpdump had a buffer overflow in print-udp.c:udp_print() (bsc#1020940).\n- CVE-2016-7937: The VAT parser in tcpdump had a buffer overflow in print-udp.c:vat_print() (bsc#1020940).\n- CVE-2016-7938: The ZeroMQ parser in tcpdump had an integer overflow in print-zeromq.c:zmtp1_print_frame() (bsc#1020940).\n- CVE-2016-7939: The GRE parser in tcpdump had a buffer overflow in print-gre.c, multiple functions (bsc#1020940).\n- CVE-2016-7940: The STP parser in tcpdump had a buffer overflow in print-stp.c, multiple functions (bsc#1020940).\n- CVE-2016-7973: The AppleTalk parser in tcpdump had a buffer overflow in print-atalk.c, multiple functions (bsc#1020940).\n- CVE-2016-7974: The IP parser in tcpdump had a buffer overflow in print-ip.c, multiple functions (bsc#1020940).\n- CVE-2016-7975: The TCP parser in tcpdump had a buffer overflow in print-tcp.c:tcp_print() (bsc#1020940).\n- CVE-2016-7983: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).\n- CVE-2016-7984: The TFTP parser in tcpdump had a buffer overflow in print-tftp.c:tftp_print() (bsc#1020940).\n- CVE-2016-7985: The CALM FAST parser in tcpdump had a buffer overflow in print-calm-fast.c:calm_fast_print() (bsc#1020940).\n- CVE-2016-7986: The GeoNetworking parser in tcpdump had a buffer overflow in print-geonet.c, multiple functions (bsc#1020940).\n- CVE-2016-7992: The Classical IP over ATM parser in tcpdump had a buffer overflow in print-cip.c:cip_if_print() (bsc#1020940).\n- CVE-2016-7993: A bug in util-print.c:relts_print() in tcpdump could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) (bsc#1020940).\n- CVE-2016-8574: The FRF.15 parser in tcpdump had a buffer overflow in print-fr.c:frf15_print() (bsc#1020940).\n- CVE-2016-8575: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482 (bsc#1020940).\n- CVE-2017-5202: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).\n- CVE-2017-5203: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).\n- CVE-2017-5204: The IPv6 parser in tcpdump had a buffer overflow in print-ip6.c:ip6_print() (bsc#1020940).\n- CVE-2017-5205: The ISAKMP parser in tcpdump had a buffer overflow in print-isakmp.c:ikev2_e_print() (bsc#1020940).\n- CVE-2017-5341: The OTV parser in tcpdump had a buffer overflow in print-otv.c:otv_print() (bsc#1020940).\n- CVE-2017-5342: In tcpdump a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print() (bsc#1020940).\n- CVE-2017-5482: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575 (bsc#1020940).\n- CVE-2017-5483: The SNMP parser in tcpdump had a buffer overflow in print-snmp.c:asn1_parse() (bsc#1020940).\n- CVE-2017-5484: The ATM parser in tcpdump had a buffer overflow in print-atm.c:sig_print() (bsc#1020940).\n- CVE-2017-5485: The ISO CLNS parser in tcpdump had a buffer overflow in addrtoname.c:lookup_nsap() (bsc#1020940).\n- CVE-2017-5486: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).\n- CVE-2015-3138: Fixed potential denial of service in print-wb.c (bsc#927637).\n- CVE-2015-0261: Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value (bsc#922220).\n- CVE-2015-2153: The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU) (bsc#922221).\n- CVE-2015-2154: The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value (bsc#922222).\n- CVE-2015-2155: The force printer in tcpdump allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors (bsc#922223).\n- CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump 3.9.6 when in verbose mode, allowed remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame (bsc#905870).\n- CVE-2014-8768: Multiple Integer underflows in the geonet_print function in tcpdump when run in verbose mode, allowed remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame (bsc#905871).\n- CVE-2014-8769: tcpdump might have allowed remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access (bsc#905872).\n\nThese non-security issues were fixed in tcpdump:\n\n- PPKI to Router Protocol: Fix Segmentation Faults and other problems\n- RPKI to Router Protocol: print strings with fn_printn()\n- Added a short option '#', same as long option '--number'\n- nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL, DHCPv6 enhancements/fixes\n- M3UA decode added.\n- Added bittok2str().\n- A number of unaligned access faults fixed\n- The -A flag does not consider CR to be printable anymore\n- fx.lebail took over coverity baby sitting\n- Default snapshot size increased to 256K for accomodate USB captures\n\nThese non-security issues were fixed in libpcap:\n\n- Provide a -devel-static subpackage that contains the static\n  libraries and all the extra dependencies which are not needed\n  for dynamic linking.\n- Fix handling of packet count in the TPACKET_V3 inner loop\n- Filter out duplicate looped back CAN frames.\n- Fix the handling of loopback filters for IPv6 packets.\n- Add a link-layer header type for RDS (IEC 62106) groups.\n- Handle all CAN captures with pcap-linux.c, in cooked mode.\n- Removes the need for the 'host-endian' link-layer header type.\n- Have separate DLTs for big-endian and host-endian SocketCAN headers.\n- Properly check for sock_recv() errors.\n- Re-impose some of Winsock's limitations on sock_recv().\n- Replace sprintf() with pcap_snprintf().\n- Fix signature of pcap_stats_ex_remote().\n- Have rpcap_remoteact_getsock() return a SOCKET and supply an 'is active' flag.\n- Clean up {DAG, Septel, Myricom SNF}-only builds.\n- pcap_create_interface() needs the interface name on Linux.\n- Clean up hardware time stamp support: the 'any' device does not support any time stamp types.\n- Recognize 802.1ad nested VLAN tag in vlan filter.\n- Support for filtering Geneve encapsulated packets.\n- Fix handling of zones for BPF on Solaris\n- Added bpf_filter1() with extensions\n- EBUSY can now be returned by SNFv3 code.\n- Don't crash on filters testing a non-existent link-layer type field.\n- Fix sending in non-blocking mode on Linux with memory-mapped capture.\n- Fix timestamps when reading pcap-ng files on big-endian machines.\n- Fixes for byte order issues with NFLOG captures\n- Handle using cooked mode for DLT_NETLINK in activate_new().\n","id":"SUSE-SU-2017:1110-1","modified":"2017-04-26T15:31:46Z","published":"2017-04-26T15:31:46Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20171110-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1035686"},{"type":"REPORT","url":"https://bugzilla.suse.com/905870"},{"type":"REPORT","url":"https://bugzilla.suse.com/905871"},{"type":"REPORT","url":"https://bugzilla.suse.com/905872"},{"type":"REPORT","url":"https://bugzilla.suse.com/922220"},{"type":"REPORT","url":"https://bugzilla.suse.com/922221"},{"type":"REPORT","url":"https://bugzilla.suse.com/922222"},{"type":"REPORT","url":"https://bugzilla.suse.com/922223"},{"type":"REPORT","url":"https://bugzilla.suse.com/927637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-0261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7940"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7986"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5342"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5482"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5486"}],"related":["CVE-2014-8767","CVE-2014-8768","CVE-2014-8769","CVE-2015-0261","CVE-2015-2153","CVE-2015-2154","CVE-2015-2155","CVE-2015-3138","CVE-2016-7922","CVE-2016-7923","CVE-2016-7924","CVE-2016-7925","CVE-2016-7926","CVE-2016-7927","CVE-2016-7928","CVE-2016-7929","CVE-2016-7930","CVE-2016-7931","CVE-2016-7932","CVE-2016-7933","CVE-2016-7934","CVE-2016-7935","CVE-2016-7936","CVE-2016-7937","CVE-2016-7938","CVE-2016-7939","CVE-2016-7940","CVE-2016-7973","CVE-2016-7974","CVE-2016-7975","CVE-2016-7983","CVE-2016-7984","CVE-2016-7985","CVE-2016-7986","CVE-2016-7992","CVE-2016-7993","CVE-2016-8574","CVE-2016-8575","CVE-2017-5202","CVE-2017-5203","CVE-2017-5204","CVE-2017-5205","CVE-2017-5341","CVE-2017-5342","CVE-2017-5482","CVE-2017-5483","CVE-2017-5484","CVE-2017-5485","CVE-2017-5486"],"summary":"Security update for tcpdump, libpcap","upstream":["CVE-2014-8767","CVE-2014-8768","CVE-2014-8769","CVE-2015-0261","CVE-2015-2153","CVE-2015-2154","CVE-2015-2155","CVE-2015-3138","CVE-2016-7922","CVE-2016-7923","CVE-2016-7924","CVE-2016-7925","CVE-2016-7926","CVE-2016-7927","CVE-2016-7928","CVE-2016-7929","CVE-2016-7930","CVE-2016-7931","CVE-2016-7932","CVE-2016-7933","CVE-2016-7934","CVE-2016-7935","CVE-2016-7936","CVE-2016-7937","CVE-2016-7938","CVE-2016-7939","CVE-2016-7940","CVE-2016-7973","CVE-2016-7974","CVE-2016-7975","CVE-2016-7983","CVE-2016-7984","CVE-2016-7985","CVE-2016-7986","CVE-2016-7992","CVE-2016-7993","CVE-2016-8574","CVE-2016-8575","CVE-2017-5202","CVE-2017-5203","CVE-2017-5204","CVE-2017-5205","CVE-2017-5341","CVE-2017-5342","CVE-2017-5482","CVE-2017-5483","CVE-2017-5484","CVE-2017-5485","CVE-2017-5486"]}