Skip to content

GHSA-g3g9-5vj6-r3gj on CTRL-OS 24.05

Packages: nixVersions.nix_2_24

Status: Plausible

CVE Information

Impact

A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user installations) by following symlinks during fixed-output derivation output registration. This affects sandboxed Linux builds - sandboxed macOS builds are unaffected. The location of the temporary output used for the output copy was located inside the build chroot. A symlink, pointing to an arbitrary location in the filesystem, could be created by the derivation builder at that path. During output registration, the Nix process (running in the host mount namespace) would follow that symlink and overwrite the destination with the derivation's output contents.

In multi-user installations, this allows all users able to submit builds to the Nix daemon (allowed-users - defaulting to all users) to gain root privileges by modifying sensitive files.

Fix

The issue is fixed in 2.34.5, 2.33.4, 2.32.7, 2.31.4, 2.30.4, 2.29.3, 2.28.6. The temporary output copy is now created in a directory in the store that is inaccessible to other users.

Patches for versions 2.31, 2.32, 2.33 and 2.34 also include additional hardening to prevent communication and file descriptor smuggling between cooperating fixed-output-derivations via abstract Unix sockets. This hardening is effective on kernels ≥ 6.12 with the landlock LSM enabled. On older kernels, it is skipped. This mitigation is ineffective at preventing communication between fixed-output derivations and processes running outside the Nix sandbox.

Workarounds

Do not allow untrusted builds to be submitted to the Nix daemon (via the allowed-users setting or by making the /nix/var/nix/daemon-socket directory inaccessible to untrusted users).

References

  • https://github.com/NixOS/nix/pull/10178, https://github.com/NixOS/nix/commit/a3163b9eabb952b4aa96e376dea95ebcca97b31a - patch that introduced the vulnerability for versions >=2.21
  • Vulnerable backport to 2.18 https://github.com/NixOS/nix/commit/4bc5a3510fa3735798f9ed3a2a30a3ea7b32343a
  • Vulnerable backport to 2.19 https://github.com/NixOS/nix/commit/7794354a982449927ee7401cdeb573ddd16c4688
  • Vulnerable backport to 2.20 https://github.com/NixOS/nix/commit/244f3eee0bbc7f11e9b383a15ed7368e2c4becc9

Updates

2026-04-07 19:48 CEST

Metadata changes:

  • Status for package nixVersions.nix_2_24: “Plausible

Comment:

Affects only the original Nix project.

(Amended on: 2026-04-07 19:51 CEST)