mirror of
https://github.com/privatevoid-net/nix-super.git
synced 2024-11-22 22:16:16 +02:00
Add 1.11.10 release notes
(cherry picked from commit 0fb60e4e0f66cc42c7c274acfcf00b51f6c829c4)
This commit is contained in:
parent
38b7d55af1
commit
1dcadadf74
2 changed files with 32 additions and 0 deletions
|
@ -13,6 +13,7 @@
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<xi:include href="rl-1.12.xml" />
|
<xi:include href="rl-1.12.xml" />
|
||||||
|
<xi:include href="rl-1.11.10.xml" />
|
||||||
<xi:include href="rl-1.11.xml" />
|
<xi:include href="rl-1.11.xml" />
|
||||||
<xi:include href="rl-1.10.xml" />
|
<xi:include href="rl-1.10.xml" />
|
||||||
<xi:include href="rl-1.9.xml" />
|
<xi:include href="rl-1.9.xml" />
|
||||||
|
|
31
doc/manual/release-notes/rl-1.11.10.xml
Normal file
31
doc/manual/release-notes/rl-1.11.10.xml
Normal file
|
@ -0,0 +1,31 @@
|
||||||
|
<section xmlns="http://docbook.org/ns/docbook"
|
||||||
|
xmlns:xlink="http://www.w3.org/1999/xlink"
|
||||||
|
xmlns:xi="http://www.w3.org/2001/XInclude"
|
||||||
|
version="5.0"
|
||||||
|
xml:id="ssec-relnotes-1.11.10">
|
||||||
|
|
||||||
|
<title>Release 1.11.10 (2017-06-12)</title>
|
||||||
|
|
||||||
|
<para>This release fixes a security bug in Nix’s “build user” build
|
||||||
|
isolation mechanism. Previously, Nix builders had the ability to
|
||||||
|
create setuid binaries owned by a <literal>nixbld</literal>
|
||||||
|
user. Such a binary could then be used by an attacker to assume a
|
||||||
|
<literal>nixbld</literal> identity and interfere with subsequent
|
||||||
|
builds running under the same UID.</para>
|
||||||
|
|
||||||
|
<para>To prevent this issue, Nix now disallows builders to create
|
||||||
|
setuid and setgid binaries. On Linux, this is done using a seccomp BPF
|
||||||
|
filter. Note that this imposes a small performance penalty (e.g. 1%
|
||||||
|
when building GNU Hello). Using seccomp, we now also prevent the
|
||||||
|
creation of extended attributes and POSIX ACLs since these cannot be
|
||||||
|
represented in the NAR format and (in the case of POSIX ACLs) allow
|
||||||
|
bypassing regular Nix store permissions. On OS X, the restriction is
|
||||||
|
implemented using the existing sandbox mechanism, which now uses a
|
||||||
|
minimal “allow all except the creation of setuid/setgid binaries”
|
||||||
|
profile when regular sandboxing is disabled. On other platforms, the
|
||||||
|
“build user” mechanism is now disabled.</para>
|
||||||
|
|
||||||
|
<para>Thanks go to Linus Heckemann for discovering and reporting this
|
||||||
|
bug.</para>
|
||||||
|
|
||||||
|
</section>
|
Loading…
Reference in a new issue