guix_mirror_bot pushed a commit to branch master in repository guix. commit db6361bc2bf3416fde9fda6f51b49192f17022af Author: Ludovic Courtès <l...@gnu.org> AuthorDate: Mon Sep 1 17:29:40 2025 +0200
news: Add entry for the ‘content-addressed-mirrors’ security fix. * etc/news.scm: Add entry. Change-Id: Ia96a6f80d6ec557e222f2b5ee17e7c79c0eb3cbf --- etc/news.scm | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/etc/news.scm b/etc/news.scm index c7b292d617..0a367cc95d 100644 --- a/etc/news.scm +++ b/etc/news.scm @@ -40,6 +40,34 @@ (channel-news (version 0) + (entry (commit "1618ca7aa2ee8b6519ee9fd0b965e15eca2bfe45") + (title + (en "New @command{guix-daemon} privilege escalation vulnerability +fixed")) + (body + (en "A new vulnerability was identified and fixed in the build +daemon, @command{guix-daemon} (CVE ID assignment pending). Everyone is +strongly advised to upgrade @command{guix-daemon}. Guix System users can do +this with commands along these lines: + +@example +sudo guix system reconfigure /run/current-system/configuration.scm +sudo herd restart guix-daemon +@end example + +If you are using Guix on another distro, run @command{info \"(guix) Upgrading +Guix\"} or visit +@uref{https://guix.gnu.org/manual/devel/en/html_node/Upgrading-Guix.html} to +learn how to upgrade Guix. + +This vulnerability lies in the @code{builtin:download} derivation builder: +anyone with access to the daemon can craft a @code{content-addressed-mirrors} +Scheme procedure that the daemon will execute as a build user (or as the +daemon user, when running @command{guix-daemon} unprivileged). An attacker +could use this to gain build user privileges and thereafter compromise builds +performed on the system. See @uref{https://codeberg.org/guix/guix/pulls/2419} +for more information."))) + (entry (commit "3e45fc0f37d027516ac3d112ca7768d698eeac74") (title (en "All Rust applications repackaged")