Good morning,

As reported in

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752092

and

https://issues.opendnssec.org/browse/SUPPORT-136

softhsm-keyconv tool creates world-readable files. Based on the description of the tool at [1], my uneducated guess is it would allow an unprivileged user to control (if the output file is created in a directory they can access) a DNS server via rndc.

Could a CVE be assigned if one has not been already?

The Debian bug also notes a similar issue was fixed in ldns - I've asked for more details about that in the bug).

[1] http://manpages.ubuntu.com/manpages/precise/man1/softhsm-keyconv.1.html

Cheers,

--
Murray McAllister / Red Hat Product Security


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to