File _patchinfo of Package patchinfo.4019

<patchinfo incident="4019">
  <issue id="1018832" tracker="bnc">VUL-0: CVE-2017-5335,CVE-2017-5336,CVE-2017-5337: gnutls: heap and stack overflows when decoding OpenPGP certificates (GNUTLS-SA-2017-2)</issue>
  <issue id="1005879" tracker="bnc">VUL-1: CVE-2016-8610: gnutls: remote denial of service in SSL alert handling</issue>
  <issue id="999646" tracker="bnc">VUL-1: CVE-2016-7444 gnutls: Incorrect certificate validation when using OCSP responses (GNUTLS-SA-2016-3)</issue>
  <issue id="2016-7444" tracker="cve" />
  <issue id="2016-8610" tracker="cve" />
  <issue id="2017-5335" tracker="cve" />
  <issue id="2017-5337" tracker="cve" />
  <issue id="2017-5336" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>vitezslav_cizek</packager>
  <description>
This update for gnutls fixes the following security issues:

- GnuTLS could have crashed when processing maliciously crafted OpenPGP
  certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,
  CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
  (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert
  packets during the handshake (bsc#1005879, CVE-2016-8610)
</description>
  <summary>Security update for gnutls</summary>
</patchinfo>
openSUSE Build Service is sponsored by