From 9395b30964ede412ff48e744360b02920daa3a17 Mon Sep 17 00:00:00 2001 From: Sakshi Date: Wed, 15 Apr 2015 15:30:51 +0530 Subject: glusterd: coverity fix for insecure temporary file Set umask before creating temporary file Change-Id: Ia39af63b05ce68f3f3af6585b70d4129a5530269 BUG: 789278 Signed-off-by: Sakshi Reviewed-on: http://review.gluster.org/9558 Smoke: Gluster Build System Reviewed-by: Kaleb KEITHLEY CentOS-regression: Gluster Build System NetBSD-regression: NetBSD Build System Reviewed-by: Jeff Darcy --- xlators/mgmt/glusterd/src/glusterd-mountbroker.c | 3 +++ 1 file changed, 3 insertions(+) (limited to 'xlators/mgmt/glusterd/src/glusterd-mountbroker.c') diff --git a/xlators/mgmt/glusterd/src/glusterd-mountbroker.c b/xlators/mgmt/glusterd/src/glusterd-mountbroker.c index 3125612d2cf..7c069ced984 100644 --- a/xlators/mgmt/glusterd/src/glusterd-mountbroker.c +++ b/xlators/mgmt/glusterd/src/glusterd-mountbroker.c @@ -525,6 +525,7 @@ glusterd_do_mount (char *label, dict_t *argdict, char **path, int *op_errno) runner_t runner = {0,}; int ret = 0; xlator_t *this = THIS; + mode_t orig_umask = 0; priv = this->private; GF_ASSERT (priv); @@ -624,7 +625,9 @@ glusterd_do_mount (char *label, dict_t *argdict, char **path, int *op_errno) *op_errno = ENOMEM; goto out; } + orig_umask = umask(S_IRWXG | S_IRWXO); ret = mkstemp (cookie); + umask(orig_umask); if (ret == -1) { *op_errno = errno; goto out; -- cgit