|
Message-ID: <c44d5503-8393-4048-2b2b-5bc3ddac3a43@apache.org> Date: Fri, 02 Sep 2022 03:55:07 +0000 From: Jedidiah Cunningham <jedcunningham@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-38170: Apache Airflow: Overly permissive umask for deamons Description: In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--deamon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver. Mitigation: Run without the `--deamon` flag via a process supervisor instead (systemd, runit, etc.). Credit: The Apache Airflow PMC would like to thank Harry Sintonen for reporting this issue.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.