From debbugs-submit-bounces@debbugs.gnu.org Wed Oct 16 15:50:37 2019 Received: (at 37744) by debbugs.gnu.org; 16 Oct 2019 19:50:37 +0000 Received: from localhost ([127.0.0.1]:46585 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1iKpJc-0001I9-Kw for submit@debbugs.gnu.org; Wed, 16 Oct 2019 15:50:36 -0400 Received: from tobias.gr ([80.241.217.52]:55530) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1iKpJS-0001Hs-WA for 37744@debbugs.gnu.org; Wed, 16 Oct 2019 15:50:34 -0400 Received: by tobias.gr (OpenSMTPD) with ESMTP id 05cd1a08; Wed, 16 Oct 2019 19:50:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=tobias.gr; h=from:to:cc :subject:references:in-reply-to:date:message-id:mime-version :content-type; s=2018; i=me@tobias.gr; bh=alOThht3+5/WXsw2uzEGkY TcOkiloduOzS6sHFLTyRA=; b=At7LabiI/dTAsNr/13EqlQPWlmHwy410wUiQag RR5krRxjtWwgivgzfvoegygNIfKbffy65rOIsh1xj7FXzW+rorsbmKEJzUXFVpJa FFeDKyOaTs5EVMTK/AEAvsCJ3gumPc1sESGDqmJHkRpcXSLgKj8IF+0DbSkbDfw3 ySujF7effmYUcxhhCRH2Mo55lmznfQ4+L/Kpk6Yuc8fGJxdlhAz/uEFttfa/Fjj0 3E59Z23Sr8q7vo395mTZ6zRvzruieGnCctWdCUu1ezk9NamZm+kD80V+Oav2MdWh 2qD0c2+AuSBZHMrIZfH/P4rXYInHVclDLar7evRdeMM2Ftnw== Received: by submission.tobias.gr (OpenSMTPD) with ESMTPSA id 651ff84f (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256:NO); Wed, 16 Oct 2019 19:50:24 +0000 (UTC) From: Tobias Geerinckx-Rice To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#37744: Per-user profile directory hijack (CVE-2019-17365 for Nix) References: <87o8yjsr8o.fsf@gnu.org> <87blujsqq0.fsf@gnu.org> <87y2xno85o.fsf@nckx> <87d0eyuqzd.fsf@gnu.org> <87mue2nkrj.fsf@nckx> <8736fttby6.fsf@gnu.org> <87tv89rnva.fsf@gnu.org> <878spksty3.fsf@gnu.org> <20191016142221.qys2y2cb4spmwscq@pelzflorian.localdomain> <87ftjsoh40.fsf@nckx> <20191016151922.5fanqbt6kiv4offx@pelzflorian.localdomain> <87eezcogtf.fsf@nckx> <87ftjsk4d3.fsf@gnu.org> In-reply-to: <87ftjsk4d3.fsf@gnu.org> Date: Wed, 16 Oct 2019 21:50:22 +0200 Message-ID: <87d0ewo4g1.fsf@nckx> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 37744 Cc: 37744@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) --=-=-= Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable Ludo', Ludovic Court=C3=A8s =E5=86=99=E9=81=93=EF=BC=9A > Taking that into account, I propose this (I=E2=80=99ve also changed the=20 > title to > make it hopefully clearer): Here's my NL translation: (nl "Onveilige=20 @file{/var/guix/profiles/per-user}-rechten")) (nl "Het standaard gebruikersprofiel,=20 @file{~/.guix-profile}, verwijst naar @file{/var/guix/profiles/per-user/$USER}. Tot op heden kon=20 om het evenwie in @file{/var/guix/profiles/per-user} schrijven, wat het=20 @command{guix}-commando toestond de @code{$USER} submap aan te maken. Op systemen met meerdere gebuikers kon hierdoor een kwaadaardige=20 gebruiker een @code{$USER} submap met inhoud aanmaken voor een andere gebruiker=20 die nog niet was ingelogd. Omdat @code{/var/@dots{}/$USER} zich in=20 @code{$PATH} bevindt, kon het doelwit zo code uitvoeren die door de aanvaller zelf werd=20 aangeleverd. Zie @uref{https://issues.guix.gnu.org/issue/37744} voor meer=20 informatie. Dit probleem is nu verholpen: schrijven door iedereen in=20 @code{per-user} is niet meer toegestaan en @command{guix-daemon} maakt zelf submappen aan=20 namens de gebruiker. Op systemen met meerdere gebruikers raden we aan om @code{guix-daemon} nu bij te werken. Op Guix System kan dit met @code{guix pull && sudo guix system reconfigure @dots{}}, op=20 andere distributies met @code{sudo guix pull}. Herstart vervolgens in beide gevallen @code{guix-daemon} met @code{herd} of @code{systemctl}.") Kind regards, T G-R --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEfo+u0AlEeO9y5k0W2Imw8BjFSTwFAl2ndH4ACgkQ2Imw8BjF STwonA//XCCZD5qBwQ52rNYuQy+RMveNpvfyABGciNqtnacohV/JpMhK4soEFkZc PcRTlGbZdQqDMag0y5ZxpDCXboCaHJNr3Uv6t8UhDUY1kv6wOPXePAUlhn85YbEO pbt6LPp0WNnw8CWkPjl1U5HT7fhiQdfV6NDtTTUKJLOVkbUMNYtkidJK9ycykXQk o4mF+xuEVzdwibJ5bLJCSKN+3hIyFPFxOHcbGP96ocFtZeXXFki3ppkJ9Mv9OWxW 4aRl2L+7+aiQpiPytt8/RFjmzAt5uk8Ojf6l0VDMQ+8v2oJTyufp7zFHskKP6MOO I8fqvh1RCMpBM1Ddi0Rlwke4OSFmKcDlMZZtooH4Q9Czqu/pq4/U48RlM+JRryJC JsNMcAITRsRlLirRwzeX4XBOmTHV5OxXxMSEAss2xBgcz57AXDOQ2p7M7SNk072T n8jVU8LvDPk51g+x3+MmnriT24NZ+2OdWyAC63HfjaAdBJqTsFcfZXp7YvNGgde3 rYNJVzjHh62dE2bzmz5riiOZ5PxayMLlLSsqVQL7gkjFr5E0ZqKncdyhnkOiq3G2 LBI618smiGKzeCYbQ4ReRJx7xC59DJbFzu6Uxxe1ItLUhGH43EM33DbTQQu32AeD htiKQDkxv+POKHegOKwKX161mHNHUF/tPEGCCE5P7bHt+CjiDQk= =//rT -----END PGP SIGNATURE----- --=-=-=--