Blame SOURCES/autofs-5.1.4-fix-flag-file-permission.patch

aea863
autofs-5.1.4 - fix flag file permission
aea863
aea863
From: Ian Kent <raven@themaw.net>
aea863
aea863
The flag file used to check if automount(8) is running was being
aea863
created with mode 0 which caused unnecessary dac_override AVC
aea863
failures.
aea863
aea863
There's no reason to protect this file so just use 0644 as the
aea863
file permission.
aea863
aea863
Signed-off-by: Ian Kent <raven@themaw.net>
aea863
---
aea863
 CHANGELOG     |    3 +++
aea863
 daemon/flag.c |    2 +-
aea863
 2 files changed, 4 insertions(+), 1 deletion(-)
aea863
aea863
diff --git a/CHANGELOG b/CHANGELOG
aea863
index 246279ae..d07d88ce 100644
aea863
--- a/CHANGELOG
aea863
+++ b/CHANGELOG
aea863
@@ -1,3 +1,6 @@
aea863
+xx/xx/2018 autofs-5.1.5
aea863
+- fix flag file permission.
aea863
+
aea863
 19/12/2017 autofs-5.1.4
aea863
 - fix spec file url.
aea863
 - fix unset tsd group name handling.
aea863
diff --git a/daemon/flag.c b/daemon/flag.c
aea863
index 99f26847..ff9858c8 100644
aea863
--- a/daemon/flag.c
aea863
+++ b/daemon/flag.c
aea863
@@ -164,7 +164,7 @@ int aquire_flag_file(void)
aea863
 	while (!we_created_flagfile) {
aea863
 		int errsv, i, j;
aea863
 
aea863
-		i = open_fd_mode(linkf, O_WRONLY|O_CREAT, 0);
aea863
+		i = open_fd_mode(linkf, O_WRONLY|O_CREAT, 0644);
aea863
 		if (i < 0) {
aea863
 			release_flag_file();
aea863
 			return 0;