GNU Guix sports functional package management
GNU Guix sports functional package management
Posted Aug 2, 2013 14:01 UTC (Fri) by etienne (guest, #25256)Parent article: GNU Guix sports functional package management
Isn't that a can of worm when the package contains a library, and "ldconfig" state is shared in between users?
How about security risk when a suid application is linked to the new library?
Posted Aug 2, 2013 17:05 UTC (Fri)
by mathstuf (subscriber, #69389)
[Link]
Also, currently installed applications wouldn't use the new package; the old package that was linked into the suid binary would still be there.
Posted Aug 2, 2013 20:32 UTC (Fri)
by virtex (subscriber, #3019)
[Link]
This is the type of package management that would be most useful for individual users. Allowing a user to install their own private version of Firefox, however, would be secondary, at least in my opinion.
Posted Aug 3, 2013 2:31 UTC (Sat)
by idupree (guest, #71169)
[Link]
"[Unprivileged?] users cannot install setuid binaries." - http://nixos.org/nixos/ . (Also, Openwall GNU/*/Linux has made a working system with no suid/sgid/fscaps binaries at all. I hope everyone goes this way eventually.)
Yes, it's a can of worms; these people opened the can and killed all the worms. After all, these worms threatened purity even without unprivileged package installation. Consider: If you (sysadmin) left an old, vulnerable 'sudo' installed? System security depends on whether you garbage-collect it![*] But if the filesystem cannot grant capabilities, and if users are already allowed to run their own binaries in their home directories, then adding data to new places in /nix/store is not a risk (besides defense-in-depth).
[*] I'm not up-to-date regarding whether Nix and/or Guix have this old-setuid-executables risk. I think the Openwall approach to setuid would be the best, but maybe that's just me.
GNU Guix sports functional package management
GNU Guix sports functional package management
GNU Guix sports functional package management