File _patchinfo of Package patchinfo.6986
<patchinfo incident="6986"> <issue id="1038337" tracker="bnc">VUL-1: gnutls: out-of-bound read in OpenPGP certificate parsing</issue> <issue id="1034173" tracker="bnc">VUL-0: CVE-2017-7869: gnutls: integer overflow and heap-based buffer overflow (cdk_pkt_read function in opencdk/read-packet.c)</issue> <issue id="1043398" tracker="bnc">VUL-1: CVE-2017-7507: gnutls: Crash upon receiving well-formed status_request extension</issue> <issue id="2017-7869" tracker="cve" /> <issue id="2017-7507" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>vitezslav_cizek</packager> <description>This update for gnutls fixes the following issues: - GNUTLS-SA-2017-4 / CVE-2017-7507: Fix crash in status response TLS extension decoding (bsc#1043398) - GNUTLS-SA-2017-3 / CVE-2017-7869: Fix out-of-bounds write in OpenPGP certificate decoding (bsc#1034173) - Address read of 4 bytes past the end of buffer in OpenPGP certificate parsing (bsc#1038337) This update was imported from the SUSE:SLE-12:Update update project.</description> <summary>Security update for gnutls</summary> </patchinfo>