<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gnutls</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0386-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-04T08:55:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-04T08:55:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-04T08:55:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gnutls</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for gnutls fixes the following security issues:

- GnuTLS could have crashed when processing maliciously crafted OpenPGP
  certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,
  CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
  (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert
  packets during the handshake (bsc#1005879, CVE-2016-8610)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:0386-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gnutls-3.2.15-9.1">
      <FullProductName ProductID="gnutls-3.2.15-9.1">gnutls-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-devel-3.2.15-9.1">
      <FullProductName ProductID="libgnutls-devel-3.2.15-9.1">libgnutls-devel-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-devel-32bit-3.2.15-9.1">
      <FullProductName ProductID="libgnutls-devel-32bit-3.2.15-9.1">libgnutls-devel-32bit-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-openssl-devel-3.2.15-9.1">
      <FullProductName ProductID="libgnutls-openssl-devel-3.2.15-9.1">libgnutls-openssl-devel-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-openssl27-3.2.15-9.1">
      <FullProductName ProductID="libgnutls-openssl27-3.2.15-9.1">libgnutls-openssl27-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls28-3.2.15-9.1">
      <FullProductName ProductID="libgnutls28-3.2.15-9.1">libgnutls28-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls28-32bit-3.2.15-9.1">
      <FullProductName ProductID="libgnutls28-32bit-3.2.15-9.1">libgnutls28-32bit-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutlsxx-devel-3.2.15-9.1">
      <FullProductName ProductID="libgnutlsxx-devel-3.2.15-9.1">libgnutlsxx-devel-3.2.15-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutlsxx28-3.2.15-9.1">
      <FullProductName ProductID="libgnutlsxx28-3.2.15-9.1">libgnutlsxx28-3.2.15-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gnutls-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:gnutls-3.2.15-9.1">gnutls-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutls-devel-3.2.15-9.1">libgnutls-devel-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-32bit-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutls-devel-32bit-3.2.15-9.1">libgnutls-devel-32bit-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-openssl-devel-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutls-openssl-devel-3.2.15-9.1">libgnutls-openssl-devel-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-openssl27-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutls-openssl27-3.2.15-9.1">libgnutls-openssl27-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls28-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutls28-3.2.15-9.1">libgnutls28-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls28-32bit-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutls28-32bit-3.2.15-9.1">libgnutls28-32bit-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx-devel-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutlsxx-devel-3.2.15-9.1">libgnutlsxx-devel-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx28-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libgnutlsxx28-3.2.15-9.1">libgnutlsxx28-3.2.15-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnutls-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:gnutls-3.2.15-9.1">gnutls-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutls-devel-3.2.15-9.1">libgnutls-devel-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-32bit-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutls-devel-32bit-3.2.15-9.1">libgnutls-devel-32bit-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-openssl-devel-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutls-openssl-devel-3.2.15-9.1">libgnutls-openssl-devel-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-openssl27-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutls-openssl27-3.2.15-9.1">libgnutls-openssl27-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls28-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutls28-3.2.15-9.1">libgnutls28-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls28-32bit-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutls28-32bit-3.2.15-9.1">libgnutls28-32bit-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx-devel-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutlsxx-devel-3.2.15-9.1">libgnutlsxx-devel-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx28-3.2.15-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libgnutlsxx28-3.2.15-9.1">libgnutlsxx28-3.2.15-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.</Note>
    </Notes>
    <CVE>CVE-2016-7444</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx28-3.2.15-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7444.html</URL>
        <Description>CVE-2016-7444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999646</URL>
        <Description>SUSE Bug 999646</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.</Note>
    </Notes>
    <CVE>CVE-2016-8610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx28-3.2.15-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8610.html</URL>
        <Description>CVE-2016-8610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005878</URL>
        <Description>SUSE Bug 1005878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005879</URL>
        <Description>SUSE Bug 1005879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120592</URL>
        <Description>SUSE Bug 1120592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982575</URL>
        <Description>SUSE Bug 982575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.</Note>
    </Notes>
    <CVE>CVE-2017-5335</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx28-3.2.15-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5335.html</URL>
        <Description>CVE-2017-5335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018832</URL>
        <Description>SUSE Bug 1018832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021057</URL>
        <Description>SUSE Bug 1021057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.</Note>
    </Notes>
    <CVE>CVE-2017-5336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx28-3.2.15-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5336.html</URL>
        <Description>CVE-2017-5336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018832</URL>
        <Description>SUSE Bug 1018832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021057</URL>
        <Description>SUSE Bug 1021057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.</Note>
    </Notes>
    <CVE>CVE-2017-5337</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libgnutlsxx28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:gnutls-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-devel-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls-openssl27-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutls28-32bit-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx-devel-3.2.15-9.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libgnutlsxx28-3.2.15-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5337.html</URL>
        <Description>CVE-2017-5337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018832</URL>
        <Description>SUSE Bug 1018832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021057</URL>
        <Description>SUSE Bug 1021057</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
