Blame SOURCES/libcgroup-0.41-CVE-2018-14348.patch

138091
From 513d6c4555ad3e925ba1463ec5f9f9b45453fc10 Mon Sep 17 00:00:00 2001
138091
From: Michal Hocko <mhocko@suse.com>
138091
Date: Wed, 18 Jul 2018 11:24:29 +0200
138091
Subject: [PATCH] cgrulesengd: remove umask(0)
138091
138091
One of our partners has noticed that cgred daemon is creating a log file
138091
(/var/log/cgred) with too wide permissions (0666) and that is seen as
138091
a security bug because an untrusted user can write to otherwise
138091
restricted area. CVE-2018-14348 has been assigned to this issue.
138091
138091
Signed-off-by: Michal Hocko <mhocko@suse.com>
138091
Acked-by: Balbir Singh <bsingharora@gmail.com>
138091
---
138091
 src/daemon/cgrulesengd.c | 3 ---
138091
 1 file changed, 3 deletions(-)
138091
138091
diff --git a/src/daemon/cgrulesengd.c b/src/daemon/cgrulesengd.c
138091
index d959eff..ff6187a 100644
138091
--- a/src/daemon/cgrulesengd.c
138091
+++ b/src/daemon/cgrulesengd.c
138091
@@ -889,9 +889,6 @@ int cgre_start_daemon(const char *logp, const int logf,
138091
 		} else if (pid > 0) {
138091
 			exit(EXIT_SUCCESS);
138091
 		}
138091
-
138091
-		/* Change the file mode mask. */
138091
-		umask(0);
138091
 	} else {
138091
 		flog(LOG_DEBUG, "Not using daemon mode\n");
138091
 		pid = getpid();
138091
-- 
138091
2.17.2
138091