Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Dec 2013 22:34:59 +0100
From: Salvatore Bonaccorso <>
Subject: CVE Request: Proc::Daemon writes pidfile with mode 666

Hi Kurt,

christian mock <> has reported[1] that Proc::Daemon, when
instructed to write a pid file, does that with a umask set to 0, so
the pid file ends up with world-writable permissions.

Upstream bugreport is at [2].

Axel Beckert has commited a patch to the Debian packaging[3] and
forwarded it to upstream.


Could a CVE be assigend for this issue?

Regards and thanks in advance,

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ