-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security: Fix Possible Symlink race in package spawn #7
Comments
This is linked to #12 |
If we're paranoid we can do a hash check of the linked file afterwards. What is the actual surface area of this risk? |
I dont know, @tv42 tv` in irc #go-nuts mentioned it. I think for obvious reasons many go programmers are much more knowledgable about certain security flaws and therefore would like to see code that at least try to move in the right direction. I think but Im not sure, that this was fixed in the provisioner merge. I stopped using the global temp directories and used the basedirectory set by the user. This is also only a risk with the default provisioner anyway which is really just a helper for devs to get started. Any final distro should have the binaries packed in. |
I think we should definitely do a hash check of the Thrust Exe if the Default Provisioner/Spawner are used. Dont want to accidentally execute an unknown executable in privileged mode. I think the symlink race is handled however by not using the tmp dir or any globally accessible dir. |
|
Thanks for the link. Will probably try to get this in soon, unless someone wants to do a PR. Really would like to get the symlink race fixed. |
https://en.wikipedia.org/wiki/Symlink_race
I was enlightened to the fact that there may be a Symlink Race condition in our auto bootstrapping methods. Need to research the subject and apply a fix.
The text was updated successfully, but these errors were encountered: