summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/httpserver
diff options
context:
space:
mode:
authorJörg Thalheim <joerg@thalheim.io>2017-05-10 09:52:11 +0100
committerJörg Thalheim <joerg@thalheim.io>2017-05-10 18:03:42 +0100
commit731917a800aaf7acbd8d20a0c45ac30d35204f32 (patch)
tree4be9ac7436b5138bddf4cb10c8ea605b70c31f9e /pkgs/development/python-modules/httpserver
parent98ff062ed4bf7b01ac07b22890694ebf05ec4ef5 (diff)
cups: mount private /tmp
printer driver and wrapper are often not written with security in mind. While reviewing https://github.com/NixOS/nixpkgs/pull/25654 I found a symlink-race vulnerability within the wrapper code, when writing unique files in /tmp. I expect this script to be reused in other models as well as similar vulnerabilities in the code of other vendors. Therefore I propose to make /tmp of cups.service private so that only processes with the same privileges are able to access these files.
Diffstat (limited to 'pkgs/development/python-modules/httpserver')
0 files changed, 0 insertions, 0 deletions