Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 758971 (CVE-2020-28935) - [TRACKER] symbolic link traversal when writing PID file (CVE-2020-28935)
Summary: [TRACKER] symbolic link traversal when writing PID file (CVE-2020-28935)
Status: RESOLVED FIXED
Alias: CVE-2020-28935
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.nlnetlabs.nl/downloads/un...
Whiteboard:
Keywords: Tracker
Depends on: 758974 758977
Blocks:
  Show dependency tree
 
Reported: 2020-12-07 23:21 UTC by Thomas Deutschmann (RETIRED)
Modified: 2021-01-29 00:43 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann (RETIRED) gentoo-dev 2020-12-07 23:21:58 UTC
Unbound and NSD when writing the PID file would not check if an existing file was a symlink. This could allow for a local symlink attack if an attacker has access to the user Unbound/NSD runs as.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-01-29 00:43:20 UTC
Dead tracker.