Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of windows: remove LazyDLL calls for system modules into release/1.5.x #19928

Merged
merged 1 commit into from
Feb 9, 2024

Conversation

hc-github-team-nomad-core
Copy link
Contributor

Backport

This PR is auto-generated from #19925 to be assessed for backporting due to the inclusion of the label backport/1.5.x.

The below text is copied from the body of the original PR.


On Windows, Nomad uses syscall.NewLazyDLL and syscall.LoadDLL functions to load a few system DLL files, which does not prevent DLL hijacking attacks. Hypothetically a local attacker on the client host that can place an abusive library in a specific location could use this to escalate privileges to the Nomad process. Although this attack does not fall within the Nomad security model, it doesn't hurt to follow good practices here.

We can remove two of these DLL loads by using wrapper functions provided by the stdlib in x/sys/windows

Fixes: https://github.com/hashicorp/nomad-enterprise/issues/991


Overview of commits

@tgross tgross merged commit 25efac3 into release/1.5.x Feb 9, 2024
24 of 26 checks passed
@tgross tgross deleted the backport/b-lazydll/enormously-apt-bulldog branch February 9, 2024 14:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants