Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

world readable initscripts are a security vulnerability #637

Open
robert-bo-davis opened this issue Feb 22, 2017 · 1 comment
Open

world readable initscripts are a security vulnerability #637

robert-bo-davis opened this issue Feb 22, 2017 · 1 comment

Comments

@robert-bo-davis
Copy link
Contributor

This is similar to the problem addressed by 8fa788b. The initscripts created by docker::run() are world readable/executable by default which exposes potentially sensitive env variables to any authenticated system user.

Setting their owner to "root:${docker::params::docker_group}" and mode to '0750' or '0640' depending on the type of file should resolve this problem. I am happy to submit a PR with these changes if you think that is an acceptable way to mitigate the problem.

@scotty-c
Copy link
Contributor

scotty-c commented May 3, 2017

@mujiburger If you could submit a PR with your suggested changes it would be greatly appreciated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants