Hi Konrad,

Konrad Hinsen <konrad.hin...@fastmail.net> writes:

>     $ guix repl -- content-addressed-mirrors-vuln-check.scm

[...]

>     In guix/scripts/perform-download.scm:
>          90:7 11 (_ _)
>     In ice-9/sandbox.scm:
>         168:2 10 (eval-in-sandbox (map (lambda (proc) (proc "co…" …)) #) …)
>          97:8  9 (call-with-time-limit _ #<procedure 7ffff1f8bb40 at ic…> …)
>        145:13  8 (call-with-allocation-limit _ #<procedure 7ffff1f99ca0…> …)
>     In unknown file:
>                7 (call-with-stack-overflow-handler 1250000 #<procedure …> …)
>                6 (eval (map (lambda (proc) (proc "content-addre…" …)) #) #)
>     In ice-9/eval.scm:
>        196:43  5 (_ #f)
>         619:8  4 (_ #f)
>        191:27  3 (_ #f)
>        223:20  2 (proc #<module (#{ g108}#) 7ffff1f1df00>)
>     In unknown file:
>                1 (%resolve-variable (7 . mkdir) #<module (#{ g108}#) 7ff…>)
>     In ice-9/boot-9.scm:
>       1685:16  0 (raise-exception _ #:continuable? _)
>
>     ice-9/boot-9.scm:1685:16: In procedure raise-exception:
>     error: mkdir: unbound variable
>     builder for 
> `/gnu/store/wk1wmpjldxpdjb53r827f6nk5j8y8awg-content-addressed-mirrors-vuln-check.drv'
>  failed with exit code 1
>     content-addressed-mirrors can evaluate arbitrary code, guix-daemon is 
> VULNERABLE

No, it actually shows that the fix is in place: above we see the code
evaluated in a “sandbox” (isolated environment) where ‘mkdir’ is
unavailable.

Most likely, the witness /tmp/content-addressed-mirrors-vulnerable was
already present when you ran the test.

Could you try re-running it after doing
“rmdir /tmp/content-addressed-mirrors-vulnerable”?

HTH,
Ludo’.

Reply via email to