|
Message-ID: <1305039325.4942.14.camel@oban> Date: Tue, 10 May 2011 16:55:25 +0200 From: Yves-Alexis Perez <corsac@...ian.org> To: oss-security@...ts.openwall.com Cc: Martin Zobel-Helas <zobel@...ian.org>, 626281@...s.debian.org Subject: CVE request: keepalived pid file permissions issue Hey, it was reported that keepalived (and some other daemons) store their pid file with permission 666. A bug was opened for keepalived in Debian, could a CVE be assigned to the issue? Bug text was: On mar., 2011-05-10 at 16:33 +0200, Martin Zobel-Helas wrote: > Package: keepalived > Version: 1.1.12-1 > Severity: grave > Tags: security > > Hi, > > keepalive writes a public writeable pid file to /var/run > > -rw-rw-rw- 1 root root 5 2011-02-08 13:00 keepalived.pid > > Cheers, > Martin > > > reference: http://lists.debian.org/05578BFF-44FC-41B3-9E8E-C11B5B9A6C11@gmail.com Thanks, -- Yves-Alexis
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.