Summary: | <net-dns/ldns-utils-1.7.0 : ldns-keygen generates keys with world readable permissions | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | mschiff |
Priority: | Normal | Flags: | zlogene:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1093943 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
net-dns/ldns-utils-1.7.0-r1
net-libs/ldns-1.7.0-r2
|
Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Upstream bug at https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=573 including patch. I don't see any upstream release for it at this time ( The latest release is 1.6.17, dating Jan 10, 2014) The commit for the Fix is here: http://git.nlnetlabs.nl/ldns/commit/?h=develop&id=169f38c1e25750f935838b670871056428977e6b Debian also released a version for this under: 1.6.17-4 Ping! It has been a month since last message, upstream has not released any new packages just a patch in GIT. Do we just want to patch like Debian? CVE-2014-3209 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3209): The ldns-keygen tool in ldns 1.6.x uses the current umask to set the privileges of the private key, which might allow local users to obtain the private key by reading the file. CC'ing new maintainer. @ Marc: Please see comment #3 From https://www.nlnetlabs.nl Version 1.7.0 is available since 12/2016 and has fixed the bug. Maintainer, could you please comment the status from the last ebuild, is it already stable? If not, is there something that we can help with? Thanks Please CC arches to start stabilization. Arches, go ahead please and stabilize net-dns/ldns-utils-17.0 Thanks! An automated check of this bug failed - repoman reported dependency errors (137 lines truncated):
> dependency.bad net-dns/ldns-utils/ldns-utils-1.7.0.ebuild: DEPEND: amd64(default/linux/amd64/13.0) ['>=net-libs/ldns-1.7.0[dane?,ecdsa?,gost?,ssl?]']
> dependency.bad net-dns/ldns-utils/ldns-utils-1.7.0.ebuild: RDEPEND: amd64(default/linux/amd64/13.0) ['>=net-libs/ldns-1.7.0[dane?,ecdsa?,gost?,ssl?]']
> dependency.bad net-dns/ldns-utils/ldns-utils-1.7.0.ebuild: DEPEND: amd64(default/linux/amd64/13.0/desktop) ['>=net-libs/ldns-1.7.0[dane?,ecdsa?,gost?,ssl?]']
hppa stable amd64 stable x86 stable Please update the package list. arm stable Updated package list to fix build of net-libs/ldns without ssl flag (It is now removed) and net-dns/ldns-utils update adds missing REQUIRED_USE. See following bugs for more info: https://bugs.gentoo.org/640142 https://bugs.gentoo.org/640132 x86 stable ia64 stable amd64 stable ppc/ppc64 stable sparc stable (thanks to Rolf Eike Beer) arm stable hppa stable (thanks to Rolf Eike Beer) @alpha, ping! Alpha has no stable version and still hasn't stabilized. @maintainer, can we please cleanup the vulnerable versions? Stable on alpha, sorry for the delay. (In reply to Tobias Klausmann from comment #25) > Stable on alpha, sorry for the delay. Thanks, Tobias! @maintainer, please clean the vulnerable versions from the tree. |