Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 7 Jun 2016 08:45:27 +0200
From: Salvatore Bonaccorso <>
To: OSS Security Mailinglist <>
Subject: CVE Request: GnuTLS: GNUTLS-SA-2016-1: File overwrite by setuid


GnuTLS 3.4.13 was released addressing GNUTLS-SA-2016-1, :

> Setuid programs using GnuTLS 3.4.12 could potentially allow an
> attacker to overwrite and corrupt arbitrary files in the filesystem.
> This issue was introduced in GnuTLS 3.4.12 and fixed in GnuTLS 3.4.13.
> Recommendation: Upgrade to GnuTLS 3.4.13, or later versions.

The relevant upstream commits seem to be:

Can you assign a CVE for this issue?


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ