Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 09 Sep 2014 00:46:22 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>,
        Assign a CVE Identifier <cve-assign@...re.org>,
        Trevor Jay <tjay@...hat.com>
Subject: headintheclouds tmp vulns - also request for referees decision on
 tmp vulns in deployment tools

So in theory this is software is used for docker provisioning thing, so
there shouldn't be any users on the docker image while it's being
deployed (or indeed any software pretty much at all), so part of me
wants to say this shouldn't qualify for a CVE if used normally, however
it is a pretty blatant tmp vuln. So for the sake of starting a
conversation about tmp vulns on systems that shouldn't have any users or
ways to exploit the tmp vuln I'm posting this one. Basically if a tree
falls in the forest but no beavers were present does anyone care that a
lumber jack might get squashed?

https://pypi.python.org/pypi/headintheclouds
headintheclouds-0.5.2/headintheclouds/tasks.py

    remote_scripts_directory = '/tmp/bootstrap_scripts'
    sudo('mkdir -p %s' % remote_scripts_directory)
    for path in sorted(scripts):
        filename = os.path.basename(path)
        remote_script = '%s/%s' % (remote_scripts_directory, filename)
        put('bootstrap/%s' % filename, remote_script, use_sudo=True)
        run('source %s' % remote_script)



-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ