DEBIAN-CVE-2014-3209

Source
https://security-tracker.debian.org/tracker/CVE-2014-3209
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-3209.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2014-3209
Upstream
Published
2014-11-16T01:59:03Z
Modified
2025-09-25T00:40:30.308474Z
Summary
[none]
Details

The ldns-keygen tool in ldns 1.6.x uses the current umask to set the privileges of the private key, which might allow local users to obtain the private key by reading the file.

References

Affected packages

Debian:11 / ldns

Package

Name
ldns
Purl
pkg:deb/debian/ldns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.17-4

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / ldns

Package

Name
ldns
Purl
pkg:deb/debian/ldns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.17-4

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / ldns

Package

Name
ldns
Purl
pkg:deb/debian/ldns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.17-4

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / ldns

Package

Name
ldns
Purl
pkg:deb/debian/ldns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.17-4

Ecosystem specific

{
    "urgency": "low"
}