git-subtree-dir: third_party/nix
git-subtree-mainline: cf8cd640c1
git-subtree-split: be66c7a6b24e3c3c6157fd37b86c7203d14acf10
		
	
			
		
			
				
	
	
		
			31 lines
		
	
	
	
		
			1.4 KiB
		
	
	
	
		
			XML
		
	
	
	
	
	
			
		
		
	
	
			31 lines
		
	
	
	
		
			1.4 KiB
		
	
	
	
		
			XML
		
	
	
	
	
	
| <section xmlns="http://docbook.org/ns/docbook"
 | ||
|       xmlns:xlink="http://www.w3.org/1999/xlink"
 | ||
|       xmlns:xi="http://www.w3.org/2001/XInclude"
 | ||
|       version="5.0"
 | ||
|       xml:id="ssec-relnotes-1.11.10">
 | ||
| 
 | ||
| <title>Release 1.11.10 (2017-06-12)</title>
 | ||
| 
 | ||
| <para>This release fixes a security bug in Nix’s “build user” build
 | ||
| isolation mechanism. Previously, Nix builders had the ability to
 | ||
| create setuid binaries owned by a <literal>nixbld</literal>
 | ||
| user. Such a binary could then be used by an attacker to assume a
 | ||
| <literal>nixbld</literal> identity and interfere with subsequent
 | ||
| builds running under the same UID.</para>
 | ||
| 
 | ||
| <para>To prevent this issue, Nix now disallows builders to create
 | ||
| setuid and setgid binaries. On Linux, this is done using a seccomp BPF
 | ||
| filter. Note that this imposes a small performance penalty (e.g. 1%
 | ||
| when building GNU Hello). Using seccomp, we now also prevent the
 | ||
| creation of extended attributes and POSIX ACLs since these cannot be
 | ||
| represented in the NAR format and (in the case of POSIX ACLs) allow
 | ||
| bypassing regular Nix store permissions. On macOS, the restriction is
 | ||
| implemented using the existing sandbox mechanism, which now uses a
 | ||
| minimal “allow all except the creation of setuid/setgid binaries”
 | ||
| profile when regular sandboxing is disabled. On other platforms, the
 | ||
| “build user” mechanism is now disabled.</para>
 | ||
| 
 | ||
| <para>Thanks go to Linus Heckemann for discovering and reporting this
 | ||
| bug.</para>
 | ||
| 
 | ||
| </section>
 |