Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Must ensure $multirust_dir isn't world-writable in order to avoid symlink race attack #131

Open
nodakai opened this issue Feb 28, 2016 · 1 comment

Comments

@nodakai
Copy link
Contributor

nodakai commented Feb 28, 2016

Cf. http://www.linuxsecurity.com/content/view/115462/151/

  1. Add -m 755 to mkdir -p $multirust_dir or wrap it with a subshell with umask 022.
  2. If the existing $multirust_dir should be world-writable, multirust should abort normal operation and ask the user to take some actions.
@brson
Copy link
Owner

brson commented Feb 28, 2016

Yes, good suggestion.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants