Lucene search

K
archlinuxArch LinuxASA-201606-12
HistoryJun 10, 2016 - 12:00 a.m.

lib32-gnutls: arbitrary file overwrite

2016-06-1000:00:00
Arch Linux
lists.archlinux.org
24

EPSS

0.002

Percentile

54.5%

Setuid programs using GnuTLS could potentially allow an attacker to
overwrite and corrupt arbitrary files in the filesystem. This issue was
introduced in GnuTLS 3.4.12 with the GNUTLS_KEYLOGFILE environment
variable handling via getenv() and fixed in GnuTLS 3.4.13 by switching
to secure_getenv() where available.

OSVersionArchitecturePackageVersionFilename
anyanyanylib32-gnutls< 3.4.13-1UNKNOWN