Lucene search

K
mageiaGentoo FoundationMGASA-2014-0025
HistoryJan 25, 2014 - 12:59 a.m.

Updated perl-Proc-Daemon package fixes CVE-2013-7135

2014-01-2500:59:38
Gentoo Foundation
advisories.mageia.org
9

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Updated perl-Proc-Daemon package fixes security vulnerability: It was reported that perl-Proc-Daemon, when instructed to write a pid file, does that with a umask set to 0, so the pid file ends up with mode 666, allowing any user on the system to overwrite it (CVE-2013-7135).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchperl-proc-daemon< 0.140.0-2.1perl-Proc-Daemon-0.140.0-2.1.mga3

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%