!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

422 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.143 Servers

Load older messages


SenderMessageTime
15 Jul 2025
@aloisw:julia0815.dealoiswIn which case it is unclear how the additional directory layer helps.15:06:43
@raitobezarius:matrix.orgraitobezarius jade_ fwiw, i think the email setup has ceased to function 17:47:10
@raitobezarius:matrix.orgraitobezariusi ceased receiving any emails including your reviews you performed on pennae's chain today17:47:18
@raitobezarius:matrix.orgraitobezariusunfortunately too low energy to jump on the problem17:47:26
@raitobezarius:matrix.orgraitobezarius cc emily if you do have some time to spare on this (no hurry ofc) 17:47:36
@me:indeednotjames.comemilyuh sure, can look into this if jade is currently away/afk17:51:26
@raitobezarius:matrix.orgraitobezarius
In reply to @aloisw:julia0815.de
Thank you. Is my understanding correct that CVE-2025-52991 only applies once you already have the directory emptying (or otherwise deletion of the build directory)?
CVE-2025-52991 is one of the primitive that is used in the attack chain, yes
17:51:29
@raitobezarius:matrix.orgraitobezariusit doesn't "apply" because it's not an attack by itself17:51:36
@raitobezarius:matrix.orgraitobezarius(that CVE is a technical CVE to refer to the technical vulnerability of leaving leftovers in the Nix store)17:51:49
@raitobezarius:matrix.orgraitobezariuswithout another primitive to chain it, it's useless17:52:01
@raitobezarius:matrix.orgraitobezarius
In reply to @aloisw:julia0815.de
In which case it is unclear how the additional directory layer helps.
additional directory layer prevent an attacker to recreate a deleted directory structure because the location is not world writeable anymore
17:52:19
@raitobezarius:matrix.orgraitobezariusah oops, I was talking about 5299217:52:41
@raitobezarius:matrix.orgraitobezarius52991 is about world readable and world writeable location17:52:48
@raitobezarius:matrix.orgraitobezariusyeah if you have /tmp/SOMETHING/nix-build-xxxxxxxxx17:53:03
@raitobezarius:matrix.orgraitobezariusif an attacker can destroys nix-build-xxxxxxxxx by abusing Nix17:53:15
@raitobezarius:matrix.orgraitobezariusit cannot recreate nix-build-xxxxxxxxxx while putting Nix to sleep with something else17:53:23
@raitobezarius:matrix.orgraitobezariusbecause SOMETHING is not world writeable17:53:29
@raitobezarius:matrix.orgraitobezarius(i'm a bit sleepy so please let me know if I'm not making sense)17:53:52
@aloisw:julia0815.dealoiswI understand, but if you have arbitrary directory empty you can just as well destroy and recreate /tmp/SOMETHING?17:53:55
@raitobezarius:matrix.orgraitobezariusthe _deletePath was arbitrary in the limits of nix-collect-garbage or nix-(build right17:54:38
@raitobezarius:matrix.orgraitobezarius* the _deletePath was arbitrary in the limits of nix-collect-garbage or nix-build right17:54:42
@raitobezarius:matrix.orgraitobezariuscould you make it delete /tmp/SOMETHING17:54:47
@raitobezarius:matrix.orgraitobezariusarguably if SOMETHING is not owned by nixbld17:56:00
@raitobezarius:matrix.orgraitobezariusbut by root:root17:56:03
@raitobezarius:matrix.orgraitobezariushm, _deletePath will still run in root context17:56:14
@raitobezarius:matrix.orgraitobezariusI agree with your assessment17:56:18
@aloisw:julia0815.dealoiswI think it deletes as root?17:56:26
@raitobezarius:matrix.orgraitobezariusThis protection is mostly hardening and is still lacking a final component: dropping the privilege of the nix daemon17:56:38
@raitobezarius:matrix.orgraitobezariusIf your deletion primitive is limited to Nix build artifacts, this is still effective17:56:55
@raitobezarius:matrix.orgraitobezariusIf your deletion primitive is absolutely unlimited and runs as root17:57:03

Show newer messages


Back to Room ListRoom Version: 10