diff options
author | Tijl Coosemans <tijl@FreeBSD.org> | 2016-06-07 16:37:58 +0000 |
---|---|---|
committer | Tijl Coosemans <tijl@FreeBSD.org> | 2016-06-07 16:37:58 +0000 |
commit | a5abef90afe2a7f84b2438fe39f5915966e44008 (patch) | |
tree | 87a70f80a4bcc380bdbbd8ebce7a39357cb1631d | |
parent | Document recent Firefox vulnerabilities (diff) |
Document GNUTLS-SA-2016-1.
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index cf671acf67bb..fda38d648f9a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,33 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9c196cfd-2ccc-11e6-94b0-0011d823eebd"> + <topic>gnutls -- file overwrite by setuid programs</topic> + <affects> + <package> + <name>gnutls</name> + <range><ge>3.4.12</ge><lt>3.4.13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>gnutls.org reports:</p> + <blockquote cite="https://gnutls.org/security.html#GNUTLS-SA-2016-1"> + <p>Setuid programs using GnuTLS 3.4.12 could potentially allow an + attacker to overwrite and corrupt arbitrary files in the + filesystem.</p> + </blockquote> + </body> + </description> + <references> + <url>https://gnutls.org/security.html#GNUTLS-SA-2016-1</url> + </references> + <dates> + <discovery>2016-06-06</discovery> + <entry>2016-06-07</entry> + </dates> + </vuln> + <vuln vid="32166082-53fa-41fa-b081-207e7a989a0a"> <topic>NSS -- multiple vulnerabilities</topic> <affects> |