Date: Tue, 7 Jun 2016 08:45:27 +0200 From: Salvatore Bonaccorso <carnil@...ian.org> To: OSS Security Mailinglist <oss-security@...ts.openwall.com> Subject: CVE Request: GnuTLS: GNUTLS-SA-2016-1: File overwrite by setuid programs Hi GnuTLS 3.4.13 was released addressing GNUTLS-SA-2016-1, http://gnutls.org/security.html#GNUTLS-SA-2016-1 : > Setuid programs using GnuTLS 3.4.12 could potentially allow an > attacker to overwrite and corrupt arbitrary files in the filesystem. > This issue was introduced in GnuTLS 3.4.12 and fixed in GnuTLS 3.4.13. > Recommendation: Upgrade to GnuTLS 3.4.13, or later versions. The relevant upstream commits seem to be: https://gitlab.com/gnutls/gnutls/compare/fb2a6baef79f4aadfd95e657fe5a18da20a1410e...86076c9b17b9a32b348cafb8b724f57f7da64d58 Can you assign a CVE for this issue? Regards, Salvatore
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ