-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
/tmp/env-vars
not cleaned up, and owned by root
#11470
Comments
I have this issue too. Additionally, though not sure if this is related, /etc/nix/path is no longer being generated by nixos-rebuild. |
Hilighting @flokli (thanks) |
same problem here |
Same problem here... I just trying to make multimonitor setup on tty framebuffer.... I could'nt use nix-shell now... |
So |
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
I think we need something like this: #11713 |
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
This overall seems like insecure tmp file handling to me. Because other users could replace files in /tmp with a symlink and make the nix-shell override other files. fixes NixOS#11470
Describe the bug
I see an error about
/tmp/env-vars
not being removable:specifically,
install: cannot remove '/tmp/env-vars': Operation not permitted
Steps To Reproduce
nix-shell
Expected behavior
No error about
/tmp/env-vars
is emittednix-env --version
outputAdditional context
I believe this is where the error occurs
See also this old issue: #262
Priorities
Add 👍 to issues you find important.
The text was updated successfully, but these errors were encountered: