Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <c44d5503-8393-4048-2b2b-5bc3ddac3a43@apache.org>
Date: Fri, 02 Sep 2022 03:55:07 +0000
From: Jedidiah Cunningham <jedcunningham@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-38170: Apache Airflow: Overly permissive umask for
 deamons 

Description:

In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the  `--deamon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver.

Mitigation:

Run without the `--deamon` flag via a process supervisor instead (systemd, runit, etc.).

Credit:

The Apache Airflow PMC would like to thank Harry Sintonen for reporting this issue.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.