-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-37172 #51
Comments
It's an interesting combination of circumstances:
The defaults:
First three (admins, system and users) are very reasonable, the two after (authenticated users) are the contentious ones, the last one (label) shouldn't play a role. I'm not quite knowledgeable enough to say whether read access for authenticated users is required for anything; in my experience, everything works without it. Note that the creator/owner will have implicit full access. ProposalIt depends on how complex we want this. The proposal above is essentially an installation only for that singular user and no one and nothing else. I'd add at least the system account. We should definitely give a choice. I guess we could have three modes:
We could preselect the mode according to the installation path and current user, but that's already a bit further than this proposal should probably go. :) I'm not sure how to design the whole process around it though. I'd like to present the permissions (to see the consequences of choosing mode 1) to the user somehow (maybe just give a button that opens the Explorer properties of the directory with the Security tab active), but we'd need to create the directory first, which means get the path first and possibly elevate as well. |
I'm afraid that giving users a choice will (a) just confuse them and (b) make them select the default anyway. What about just doing (2) always and have a page in the documentation for alternative recommended setups? I assume most users are on a single user machine, so they shouldn't see any difference compared to now with (2) right? |
Link to new page: https://www.cve.org/CVERecord?id=CVE-2022-37172 Umh, while I agree that most users are on a single user machine... I thought to share my perspective and reasoning behind:
|
Suggestion:
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37172
So there is an issue to track this.
I couldn't find any other installer that handles this, so I'm not sure what the right thing to do is (except cygwin, which seems to set some hardcoded ACLs, but I couldn't find their code/logic)
The only thing I can think of is:
Though not sure if we have the current user somehow in the installer, and if that breaks anything else. It might give more permissions as before when installing into a more strict directory (??)
On could argue that this is how Windows works.. you will get the permissions of the directory you install to, and if C is world writable, then MSYS2 is too. But I understand the the defaults of both Windows and our installer make this insecure.
Ideas / thoughts / and pointers to other projects welcome.
The text was updated successfully, but these errors were encountered: