Description
guix-daemon in GNU Guix before 5ab3c4c allows privilege escalation because build outputs are accessible by local users before file metadata concerns (e.g., for setuid and setgid programs) are properly addressed. The vulnerability can be remediated within the product via certain pull, reconfigure, and restart actions. Both 5ab3c4c and 5582241 are needed to resolve the vulnerability.
INFO
Published Date :
2024-11-17T00:00:00.000Z
Last Modified :
2024-11-20T00:10:40.441Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2024-52867 vulnerability.
| Vendors | Products |
|---|---|
| Gnu |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-52867.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Complexity
Attack Vector
Availability Impact
Confidentiality Impact
Integrity Impact
Privileges Required
Scope
User Interaction