You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The file is created before the modes are set to restrict access. If the umask of the process is set too wide, there is a very small window where a user who has installed an inotify watch on /etc/rtslib-fb-targets may be able to open /etc/rtslib-fb-targets/saveconfig.json.temp before the modes on the file are reduced. Once opened, any secrets stored in the file can be read.
Is there a better way to report security issues? I didn't see any guidance in the README.
Thanks
The text was updated successfully, but these errors were encountered:
pkalever
pushed a commit
to pkalever/rtslib-fb
that referenced
this issue
May 28, 2020
Hello, I'm reviewing rtslib-fb as part of Ubuntu's main inclusion process.
I believe that the
save_to_file()
method may have a race condition:rtslib-fb/rtslib/root.py
Line 464 in 7f791a6
The file is created before the modes are set to restrict access. If the
umask
of the process is set too wide, there is a very small window where a user who has installed an inotify watch on/etc/rtslib-fb-targets
may be able to open/etc/rtslib-fb-targets/saveconfig.json.temp
before the modes on the file are reduced. Once opened, any secrets stored in the file can be read.Is there a better way to report security issues? I didn't see any guidance in the README.
Thanks
The text was updated successfully, but these errors were encountered: