Open wizeman opened 5 years ago
@wizeman Are you going to open an issue about actually patching systemd to fix the vulnerabilities, or shall I do it?
@schmittlauch Please go ahead. I can't tell which systemd version has fixed those vulnerabilities from reading the advisory.
@fpletz is actively working on this
@fpletz Any updates?
Do you see otherspot than this that need to be updated ?
I would imagine there could be some fallout from adding the flag, i.e., it may break some packages, which would need to be fixed, updated or have the flag be removed from it.
Assuming my initial comment is still accurate as of today, then SUSE and Fedora have been using this flag for years already, so presumably the vast majority of packages should keep working fine.
Is this still needing to be fixed?
Is this still needing to be fixed?
Yes.
Removing the 23.11 milestone since we've passed it. Pinging 24.11 release manager @RossComputerGuy, since I'm hesitant to add this to the 24.11 milestone.
Yeah, I'm a little hesitant since we're passed the first point of blocking updates so we might be too far in the release cycle right now. However, I think we can tackle this post release.
Was told to talk to @risicle. Any idea if what sort of build failure impact we could see if we do make this the default?
I think the impact is probably quite minimal among core packages. I'm guessing this from the fact that we disable it for wine
, which implies that people have built wine
on a stdenv with stack clash protection enabled (perhaps via pkgsExtraHardening
), and wine
has an absurd dependency footprint. So I would guess all those dependencies build successfully with protection enabled (or have exceptions).
As for leaf-y packages, I can't say - it's generally difficult to say anything about that until we just try it.
Though I will say that I tend not to introduce a hardening flag and enable it by default in one NixOS release, so I'd only suggest enabling it by default after november.
Issue description
It would be good for the security of NixOS to compile user-space with
-fstack-clash-protection
. It should probably be added either as a new hardening flag or perhaps included as part of thestackprotector
flag.Motivation
CVE-2018-16864 and CVE-2018-16865 describe new vulnerabilities and exploits in systemd which
-fstack-clash-protection
can mitigate, according to the linked advisory:However, since NixOS doesn't compile user-space with
-fstack-clash-protection
, it's likely to be vulnerable.