From 667485b71df528e0d67e8d4f6e18ab972d8bf7ae Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Frings-F=C3=BCrst?= Date: Sat, 20 Feb 2016 02:38:51 +0100 Subject: Refresh patches --- debian/patches/0500-fix_CVE-2011-4339.patch | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 debian/patches/0500-fix_CVE-2011-4339.patch (limited to 'debian/patches/0500-fix_CVE-2011-4339.patch') diff --git a/debian/patches/0500-fix_CVE-2011-4339.patch b/debian/patches/0500-fix_CVE-2011-4339.patch new file mode 100644 index 0000000..48bfe8c --- /dev/null +++ b/debian/patches/0500-fix_CVE-2011-4339.patch @@ -0,0 +1,21 @@ +Description: CVE-2011-4339 + insecure file permission when creating PID files + based on 112_fix_CVE-2011-4339 +Author: Jörg Frings-Fürst +Bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651917 +Forwarded: https://sourceforge.net/p/ipmitool/patches/99/ +Last-Update: 2014-12-01 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +Index: trunk/lib/helper.c +=================================================================== +--- trunk.orig/lib/helper.c ++++ trunk/lib/helper.c +@@ -659,7 +659,6 @@ ipmi_start_daemon(struct ipmi_intf *intf + #endif + + chdir("/"); +- umask(0); + + for (fd=0; fd<64; fd++) { + if (fd != intf->fd) -- cgit v1.2.3