Closed
Conversation
packages/orchestrator/internal/template/build/phases/base/provision.sh
Outdated
Show resolved
Hide resolved
packages/orchestrator/internal/template/build/phases/base/provision.sh
Outdated
Show resolved
Hide resolved
dobrac
approved these changes
Dec 30, 2025
packages/orchestrator/internal/template/build/phases/base/provision.sh
Outdated
Show resolved
Hide resolved
tests/integration/internal/tests/api/templates/build_template_test.go
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with Cloud Agents, enable Autofix in the Cursor dashboard.
| cat <<EOF >/etc/udev/rules.d/99-fuse-permissions.rules | ||
| # Set permissions for FUSE device to allow non-root users | ||
| KERNEL=="fuse", MODE="0666" | ||
| EOF |
There was a problem hiding this comment.
Overly permissive FUSE device permissions
High Severity
Setting /dev/fuse to world-writable via chmod 666 and a udev rule MODE="0666" allows any unprivileged process to interact with FUSE, which can widen attack surface and enable unintended mounts or cross-user access beyond the intended “allow_other” use case.
Member
Author
|
Closed because I broke my worktree, reopened #1849 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.


Needed to allow non-root users to access /dev/fuse and mount volumes that can be read by other users.
Note
Medium Risk
Relaxes FUSE device permissions to world-writable (
0666) and enablesuser_allow_other, which can widen privilege boundaries depending on what runs inside the image.Overview
Updates the base
provision.shimage setup to enable non-root FUSE usage by ensuringuser_allow_otheris present in/etc/fuse.conf, creating/dev/fuseduring build if missing, and forcing permissive0666permissions viachmodplus a udev rule for runtime device creation.Written by Cursor Bugbot for commit 109424a. This will update automatically on new commits. Configure here.