Package: guix
Version: 1.2.0-3
Severity: important

Dear Maintainer,

Hi,

I saw an announcement that there is a risk of local privilege escalation via
the guix daemon.

https://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-
daemon/

It says that "Machines where the Linux protected hardlinks feature is enabled,
which is common, are also unaffected — this is the case when the contents of
/proc/sys/fs/protected_hardlinks are 1." which appears to be true on my system.

We probably should still apply the fix to our guix-daemon.

Thanks
Diane

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'stable-debug'), (500, 'testing'),
(500, 'stable'), (110, 'unstable'), (100, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-4-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages guix depends on:
ii  guile-2.2       2.2.7+1-5.4
ii  guile-2.2-libs  2.2.7+1-5.4
ii  guile-gcrypt    0.3.0-3
ii  guile-git       0.4.0-3
ii  guile-gnutls    3.7.0-7
ii  guile-json      4.3.2-2
ii  guile-lzlib     0.0.2-2
ii  guile-sqlite3   0.1.3-2
ii  guile-ssh       0.13.1-4
ii  guile-zlib      0.0.1-3
ii  libbz2-1.0      1.0.8-4
ii  libc6           2.31-9
ii  libgcc-s1       10.1.0-1
ii  libgcrypt20     1.8.7-3
ii  libsqlite3-0    3.34.1-3
ii  libssh-dev      0.9.5-1
ii  libstdc++6      10.1.0-1
ii  zlib1g          1:1.2.11.dfsg-2

Versions of packages guix recommends:
ii  nscd     2.31-9
ii  systemd  247.3-1

guix suggests no packages.

Reply via email to