blob: 8ffe82ac13fd81d90893722d74202096e3b2ac78 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201207-07">
<title>Keepalived: Denial of Service</title>
<synopsis>Keepalived uses world-writable PID files, allowing a local attacker
to kill arbitrary processes.
<product type="ebuild">keepalived</product>
<announced>July 09, 2012</announced>
<revised>July 09, 2012: 1</revised>
<package name="sys-cluster/keepalived" auto="yes" arch="*">
<unaffected range="ge">1.2.2-r3</unaffected>
<vulnerable range="lt">1.2.2-r3</vulnerable>
<p>Keepalived is a strong &amp; robust keepalive facility to the Linux
Virtual Server project.
<p>The "pidfile_write()" function in pidfile.c in Keepalived writes PID
files with insecure permissions.
<impact type="normal">
<p>A local attacker may be able to cause a Denial of Service of arbitrary
<p>There is no known workaround at this time.</p>
<p>All Keepalived users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-cluster/keepalived-1.2.2-r3"
<uri link="">CVE-2011-1784</uri>
<metadata timestamp="Mon, 11 Jun 2012 19:50:31 +0000" tag="requester">ackle</metadata>
<metadata timestamp="Mon, 09 Jul 2012 23:28:51 +0000" tag="submitter">ackle</metadata>