hardening horizon: don't mount hosts /tmp
consider this a security hardening
as it would be possible to write to host
owned private tmp files e.g. of systemd-logind
when you are able to highjack the apache2 process
inside the horizon container, which runs as root.
see the bug report for a demonstration of this.
I checked the horizon code, it only facilitates
python tempfiles module for temp file usage.
I also checked the horizon container we build
via `kolla-build -b ubuntu horizon`, which has
a /tmp/ directory.
So no mountpoint should be needed.
Closes-Bug: #2068126
Signed-off-by:
Sven Kieske <kieske@osism.tech>
Change-Id: I7ae1db8d42c83b773047bb01e846d4abee02710a
Please register or sign in to comment