-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
please do not run unsigned dll files with random names from temp folder #273
Comments
AFAIR |
When you install packages with admin rights they will go into %PROGRAMFILES%\R 4.x... which is fine. with user rights they will be installed into: As this is not a random path in the temp folder - it can be whitelisted. Security wise it would be better to work without path whitelistings but this would require all binary files from R packages to be signed. |
Unfortunately this is not an easy fix, because Windows locks the loaded DLL file which leads to complications. Typically what happens is that users cannot update packages because some process is locking the DLL file inside the package. Nevertheless, if loading the DLL from the temporary directory fails, then we try to load it from inside the (processx) package. Apparently this does not work for you, probably some virus protection stops the process instead of returning an error for the system call? |
Ah, I didn't find an explaination by reading the code.
This might work but I get tons of block messages from our SIEM. (I am not the user of the package in this case) |
Is it possible to configure your tool to avoid logging if the DLL matches some patter? E.g. Alternatively, we can introduce an environment variable that would avoid using the temporary files. Would that work for you? |
Yes, but then I would have too many rules, which will slow down everything and makes it hard to handle.
Yes, that would be fine. I could set it in Renviron.site when packaging R. |
Should be fixed in the next release, happening later today. |
Please do not run unsigned dll files with random names from temp folder - this is what malware does. (on Windows)
Our application whitelisting will block this:
%OSDRIVE%\USERS\USERNAME\APPDATA\LOCAL\TEMP\RTMPKENVDF\CALLR-CLIENT-X64-748EB4F.DLL was blocked,
The text was updated successfully, but these errors were encountered: