File _patchinfo of Package patchinfo.17730

<patchinfo incident="17730">
  <issue tracker="cve" id="2017-17785"/>
  <issue tracker="cve" id="2017-17784"/>
  <issue tracker="cve" id="2017-17786"/>
  <issue tracker="bnc" id="1073626">VUL-1: CVE-2017-17786: gimp: OOB read in TGA</issue>
  <issue tracker="bnc" id="1073624">VUL-1: CVE-2017-17784: gimp: OOB read in GBR</issue>
  <issue tracker="bnc" id="1073625">VUL-1: CVE-2017-17785: gimp: Heap overflow in FLI import</issue>
  <packager>zcjia</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for gimp</summary>
  <description>This update for gimp fixes the following issues:

- CVE-2017-17784: Fixed an insufficient string validation for input names (bsc#1073624).
- CVE-2017-17785: Fixed an heap-based buffer overflow in FLI import (bsc#1073625).
- CVE-2017-17786: Fixed an out-of-bounds read in TGA (bsc#1073626).
</description>
</patchinfo>
openSUSE Build Service is sponsored by