Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:42.2:Update
patchinfo.6336
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.6336
<patchinfo incident="6336"> <issue id="1018832" tracker="bnc">VUL-0: CVE-2017-5335,CVE-2017-5336,CVE-2017-5337: gnutls: heap and stack overflows when decoding OpenPGP certificates (GNUTLS-SA-2017-2)</issue> <issue id="1005879" tracker="bnc">VUL-1: CVE-2016-8610: gnutls: remote denial of service in SSL alert handling</issue> <issue id="999646" tracker="bnc">VUL-1: CVE-2016-7444 gnutls: Incorrect certificate validation when using OCSP responses (GNUTLS-SA-2016-3)</issue> <issue id="2016-7444" tracker="cve" /> <issue id="2016-8610" tracker="cve" /> <issue id="2017-5335" tracker="cve" /> <issue id="2017-5337" tracker="cve" /> <issue id="2017-5336" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>vitezslav_cizek</packager> <description> This update for gnutls fixes the following security issues: - GnuTLS could have crashed when processing maliciously crafted OpenPGP certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337, CVE-2017-5336) - GnuTLS could have falsely accepted certificates when using OCSP (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444) - GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert packets during the handshake (bsc#1005879, CVE-2016-8610) This update was imported from the SUSE:SLE-12:Update update project.</description> <summary>Security update for gnutls</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor