Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-59378

Опубликовано: 15 сент. 2025
Источник: debian
EPSS Низкий

Описание

In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
guixunfixedpackage
guixend-of-lifebullseyepackage

Примечания

  • https://guix.gnu.org/en/blog/2025/privilege-escalation-vulnerability-2025-2/

  • https://codeberg.org/guix/guix/pulls/2419

  • Fixed by: https://codeberg.org/guix/guix/commit/2a333541e8f1907ae0bc80cf500a99567ca46d08

  • Fixed by: https://codeberg.org/guix/guix/commit/f607aaaaaafe19257ef09ca519d325df6ae97e05

  • Fixed by: https://codeberg.org/guix/guix/commit/9202921e812708b23788b2209cdb576d456f56db

EPSS

Процентиль: 5%
0.00021
Низкий

Связанные уязвимости

CVSS3: 5.7
ubuntu
5 месяцев назад

In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).

CVSS3: 5.7
nvd
5 месяцев назад

In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).

CVSS3: 5.7
github
5 месяцев назад

In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).

EPSS

Процентиль: 5%
0.00021
Низкий