aboutsummaryrefslogtreecommitdiff
path: root/doc/manual/rl-next/cve-fod-fix.md
diff options
context:
space:
mode:
Diffstat (limited to 'doc/manual/rl-next/cve-fod-fix.md')
-rw-r--r--doc/manual/rl-next/cve-fod-fix.md21
1 files changed, 0 insertions, 21 deletions
diff --git a/doc/manual/rl-next/cve-fod-fix.md b/doc/manual/rl-next/cve-fod-fix.md
deleted file mode 100644
index 4499f639b..000000000
--- a/doc/manual/rl-next/cve-fod-fix.md
+++ /dev/null
@@ -1,21 +0,0 @@
----
-synopsis: "Fix CVE-2024-27297 (GHSA-2ffj-w4mj-pg37)"
-cls: 266
-credits: [puck, jade, thufschmitt, tomberek, valentin]
-category: Fixes
----
-
-Since Lix fixed-output derivations run in the host network namespace (which we
-wish to change in the future, see
-[lix#285](https://git.lix.systems/lix-project/lix/issues/285)), they may open
-abstract-namespace Unix sockets to each other and to programs on the host. Lix
-contained a now-fixed time-of-check/time-of-use vulnerability where one
-derivation could send writable handles to files in their final location in the
-store to another over an abstract-namespace Unix socket, exit, then the other
-derivation could wait for Lix to hash the paths and overwrite them.
-
-The impact of this vulnerability is that two malicious fixed-output derivations
-could create a poisoned path for the sources to Bash or similarly important
-software containing a backdoor, leading to local privilege execution.
-
-CppNix advisory: https://github.com/NixOS/nix/security/advisories/GHSA-2ffj-w4mj-pg37