Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown
CVE-2022-30180
Disclosure Date: June 15, 2022 (last updated November 29, 2024)
Azure RTOS GUIX Studio Information Disclosure Vulnerability
0
Attacker Value
Unknown
CVE-2022-30179
Disclosure Date: June 15, 2022 (last updated November 29, 2024)
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2022-30178
Disclosure Date: June 15, 2022 (last updated November 29, 2024)
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2022-30177
Disclosure Date: June 15, 2022 (last updated November 29, 2024)
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-27851
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable.
0
Attacker Value
Unknown
CVE-2019-18192
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
GNU Guix 1.0.1 allows local users to gain access to an arbitrary user's account because the parent directory of the user-profile directories is world writable, a similar issue to CVE-2019-17365.
0
Attacker Value
Unknown
CVE-2017-1000455
Disclosure Date: January 02, 2018 (last updated November 26, 2024)
GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix.
0