blob: d133703dec83fc17f26d432a7ece4251e0fc2b52 [file] [log] [blame]
Brad Bishopbba38f32018-08-23 16:11:46 +08001From 0d88b73d189ea3440ccaab00418d6469f76fa590 Mon Sep 17 00:00:00 2001
2From: Michal Hocko <mhocko@suse.com>
3Date: Wed, 18 Jul 2018 11:24:29 +0200
4Subject: [PATCH] cgrulesengd: remove umask(0)
5
6One of our partners has noticed that cgred daemon is creating a log file
7(/var/log/cgred) with too wide permissions (0666) and that is seen as
8a security bug because an untrusted user can write to otherwise
9restricted area. CVE-2018-14348 has been assigned to this issue.
10
11CVE: CVE-2018-14348
12Upstream-Status: Backport [https://sourceforge.net/p/libcg/libcg/ci/0d88b73d189ea3440ccaab00418d6469f76fa590]
13
14Signed-off-by: Michal Hocko <mhocko@suse.com>
15Acked-by: Balbir Singh <bsingharora@gmail.com>
16Signed-off-by: Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com>
17---
18 src/daemon/cgrulesengd.c | 3 ---
19 1 file changed, 3 deletions(-)
20
21diff --git a/src/daemon/cgrulesengd.c b/src/daemon/cgrulesengd.c
22index ea51f11..0d288f3 100644
23--- a/src/daemon/cgrulesengd.c
24+++ b/src/daemon/cgrulesengd.c
25@@ -889,9 +889,6 @@ int cgre_start_daemon(const char *logp, const int logf,
26 } else if (pid > 0) {
27 exit(EXIT_SUCCESS);
28 }
29-
30- /* Change the file mode mask. */
31- umask(0);
32 } else {
33 flog(LOG_DEBUG, "Not using daemon mode\n");
34 pid = getpid();
35--
362.13.3
37