Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new "govulncheck-with-excludes.sh" wrapper script #129

Merged
merged 1 commit into from
Jun 27, 2023

Conversation

tianon
Copy link
Owner

@tianon tianon commented Jun 27, 2023

This allows us to exclude GO-2023-1840 (aka CVE-2023-29403; #128 (comment)) from our report since we already refuse to operate when users have enabled the setuid bit on the binary.

Additionally, this updates our in-code check for setuid to also disallow setgid, but the impact of that configuration is lesser (so this is considered a best-effort pre-emptive mitigation -- hopefully the block on setuid has already discouraged users from using gosu in this way).

(This is essentially a workaround for golang/go#59507, which isn't ideal, but it's the best we have for now.)

This allows us to exclude GO-2023-1840 (aka CVE-2023-29403) from our report since we already refuse to operate when users have enabled the `setuid` bit on the binary.

Additionally, this updates our in-code check for `setuid` to also disallow `setgid`, but the impact of that configuration is lesser (so this is considered a best-effort pre-emptive mitigation -- hopefully the block on `setuid` has already discouraged users from using `gosu` in this way).
@tianon tianon mentioned this pull request Jun 27, 2023
@tianon tianon merged commit d347213 into tianon:master Jun 27, 2023
1 check passed
@tianon tianon deleted the govulncheck-with-excludes branch June 27, 2023 20:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant