malicious entry points can be installed from *any* python package
Bug #1575328 reported by
Morgan Fainberg
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
python-openstackclient |
New
|
Low
|
Unassigned | ||
stevedore |
New
|
Low
|
Unassigned |
Bug Description
With the way some projects consume stevedore (notably openstackclient) where entry points are loaded automatically, it is possible that *any* python package to install a malicious entrypoint that could modify/
This is effectively a similar problem to the ld.so.preload with C programs on linux.
Based upon limited discussions it would be nice to allow a consumer of stevedore to provide a mechanism to "white-list" libraries. This is only one option proposed. :Likely the discussion is going to be more in depth.
Changed in python-stevedore: | |
importance: | Undecided → Low |
Changed in python-openstackclient: | |
importance: | Undecided → Low |
information type: | Private Security → Public |
To post a comment you must log in.
This is likely an Class B2 type bug [1], based on bad architecture. Likely this needs an OSSN, which is published shortly after the bug is made public. I expect this bug will not remain private too terribly long.
[1] https:/ /security. openstack. org/vmt- process. html#incident- report- taxonomy