{"affected":[{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls28":"3.2.15-16.1","libgnutls28-32bit":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls28":"3.2.15-16.1","libgnutls28-32bit":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls-openssl27":"3.2.15-16.1","libgnutls28":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libgnutls-devel":"3.2.15-16.1","libgnutls-openssl-devel":"3.2.15-16.1","libgnutlsxx-devel":"3.2.15-16.1","libgnutlsxx28":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libgnutls-devel":"3.2.15-16.1","libgnutls-openssl-devel":"3.2.15-16.1","libgnutlsxx-devel":"3.2.15-16.1","libgnutlsxx28":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls-openssl27":"3.2.15-16.1","libgnutls28":"3.2.15-16.1","libgnutls28-32bit":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls-openssl27":"3.2.15-16.1","libgnutls28":"3.2.15-16.1","libgnutls28-32bit":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls-openssl27":"3.2.15-16.1","libgnutls28":"3.2.15-16.1","libgnutls28-32bit":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gnutls":"3.2.15-16.1","libgnutls-openssl27":"3.2.15-16.1","libgnutls28":"3.2.15-16.1","libgnutls28-32bit":"3.2.15-16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"gnutls","purl":"pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.15-16.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for gnutls fixes the following security issues:\n\n- GnuTLS could have crashed when processing maliciously crafted OpenPGP\n  certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,\n  CVE-2017-5336)\n- GnuTLS could have falsely accepted certificates when using OCSP\n  (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)\n- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert\n  packets during the handshake (bsc#1005879, CVE-2016-8610)\n","id":"SUSE-SU-2017:0348-1","modified":"2017-02-01T07:19:39Z","published":"2017-02-01T07:19:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170348-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1005879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1018832"},{"type":"REPORT","url":"https://bugzilla.suse.com/999646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7444"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5335"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5336"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5337"}],"related":["CVE-2016-7444","CVE-2016-8610","CVE-2017-5335","CVE-2017-5336","CVE-2017-5337"],"summary":"Security update for gnutls","upstream":["CVE-2016-7444","CVE-2016-8610","CVE-2017-5335","CVE-2017-5336","CVE-2017-5337"]}