me
/
guix
Archived
1
0
Fork 0

news: Add entry for the daemon fixed-output derivation vulnerability.

* etc/news.scm: Add entry.

Change-Id: Ib3f9c22eda1e8b9075620ec01b4edf2f24cfcf93
master
Ludovic Courtès 2024-03-11 23:13:40 +01:00
parent b8954a7fae
commit 4003c60abf
No known key found for this signature in database
GPG Key ID: 090B11993D9AEBB5
1 changed files with 39 additions and 1 deletions

View File

@ -1,6 +1,6 @@
;; GNU Guix news, for use by 'guix pull'. ;; GNU Guix news, for use by 'guix pull'.
;; ;;
;; Copyright © 2019-2023 Ludovic Courtès <ludo@gnu.org> ;; Copyright © 2019-2024 Ludovic Courtès <ludo@gnu.org>
;; Copyright © 20192021 Tobias Geerinckx-Rice <me@tobias.gr> ;; Copyright © 20192021 Tobias Geerinckx-Rice <me@tobias.gr>
;; Copyright © 2019, 2020 Miguel Ángel Arruga Vivas <rosen644835@gmail.com> ;; Copyright © 2019, 2020 Miguel Ángel Arruga Vivas <rosen644835@gmail.com>
;; Copyright © 2019, 2020 Konrad Hinsen <konrad.hinsen@fastmail.net> ;; Copyright © 2019, 2020 Konrad Hinsen <konrad.hinsen@fastmail.net>
@ -28,6 +28,44 @@
(channel-news (channel-news
(version 0) (version 0)
(entry (commit "8f4ffb3fae133bb21d7991e97c2f19a7108b1143")
(title
(en "Daemon vulnerability allowing store corruption has been fixed")
(fr "Une faille du démon permettant de corrompre le dépôt a été corrigée"))
(body
(en "A vulnerability in the build daemon, @command{guix-daemon}, was
identified and fixed. The vulnerability would allow unprivileged users to
corrupt the result of @dfn{fixed-output derivations} such as source code
tarballs and Git checkouts, which in turn could lead to local privilege
escalation.
This bug is fixed and Guix System users are advised to upgrade their system,
with a command along the lines of:
@example
sudo guix system reconfigure /run/current-system/configuration.scm
sudo herd restart guix-daemon
@end example
See @uref{https://issues.guix.gnu.org/69728} for more information on this
issue.")
(fr "Une faille de sécurité du démon de compilation,
@command{guix-daemon}, a été identifiée et corrigée. La faille permettait à
un·e utilisateur·rice sans privilège de corrompre le résultat d'une
@dfn{dérivation à sortie fixe} telle qu'une archive ou un @i{checkout} Git, ce
qui peut ensuite permettre une élévation locale de privilèges.
Ce problème est corrigé et les utilisateur·rices de Guix System sont invité·es
à mettre à jour leur système avec une commande telle que:
@example
sudo guix system reconfigure /run/current-system/configuration.scm
sudo herd restart guix-daemon
@end example
Voir @uref{https://issues.guix.gnu.org/69728} pour plus d'informations sur
cette anomalie.")))
(entry (commit "10a193596368443f441077525ebbddf787d91e4b") (entry (commit "10a193596368443f441077525ebbddf787d91e4b")
(title (title
(en "Linux-libre 4.14 removed due to end of upstream support") (en "Linux-libre 4.14 removed due to end of upstream support")