How to prevent self-hosted runners from creating world-writable shm sections? #3730
Unanswered
billrobertson42
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We are running self-hosted gha runners on RHEL 9.4. They are creating a shared memory section with world-writable permissions. I assume that the runners use this to communicate among themselves. The issue is that the lttng-ust-wait-8 section has world-write permissions, and this is causing security audit issues.
How can I prevent it from doing this? The runner users are all in the same group, so world write permission should not be required. Or is there something in the host machine configuration that should be changed?
If this can’t be changed, does anyone know what it’s using this for? Need to be able to quantify the risk.
Beta Was this translation helpful? Give feedback.
All reactions