#14338: unbound-1.13.0 (with a security fix)
-------------------------+------------------------------
 Reporter:  bdubbs       |       Owner:  pierre.labastie
     Type:  enhancement  |      Status:  closed
 Priority:  high         |   Milestone:  10.1
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:  fixed
 Keywords:               |
-------------------------+------------------------------
Changes (by pierre.labastie):

 * priority:  normal => high


Comment:

 Here is the security advisory (thanks to Douglas for giving me the link)
 {{{

 Local symlink attack
 Date:   2020-12-01
 CVE:    CVE-2020-28935
 Credit: Mason Loring Bliss
 Affects:        Unbound up to and including version 1.12.0
 Not affected:   Other versions
 Severity:       Low
 Impact: Denial of Service
 Solution:       Download patched version of Unbound, or apply the patch
 manually

 Unbound when writing and later chown'ing the PID file would not check if
 an existing file was a symlink. This is a local vulnerability that could
 create a Denial of Service of the system Unbound is running on. It
 requires an attacker having access to the limited permission user Unbound
 runs as and point through the symlink to a critical file on the system.

 Unbound 1.13.0 contains a patch. If you cannot upgrade you can also apply
 the patch manually on versions 1.6.6 up until 1.12.0. To do this, apply
 the patch on the Unbound source directory with patch -p1 <
 patch_cve-2020-28935_unbound.diff and then run make install to install
 Unbound.
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/14338#comment:7>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to