MGASA-2014-0025

Source
https://advisories.mageia.org/MGASA-2014-0025.html
Import Source
https://advisories.mageia.org/MGASA-2014-0025.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0025
Related
Published
2014-01-24T20:59:38Z
Modified
2026-02-04T02:58:46.184270Z
Summary
Updated perl-Proc-Daemon package fixes CVE-2013-7135
Details

Updated perl-Proc-Daemon package fixes security vulnerability:

It was reported that perl-Proc-Daemon, when instructed to write a pid file, does that with a umask set to 0, so the pid file ends up with mode 666, allowing any user on the system to overwrite it (CVE-2013-7135).

References
Credits

Affected packages

Mageia:3 / perl-Proc-Daemon

Package

Name
perl-Proc-Daemon
Purl
pkg:rpm/mageia/perl-Proc-Daemon?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.140.0-2.1.mga3

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2014-0025.json"