gnu guix 特权管理不恰当

admin 2023-12-01 14:58:43 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 gnu guix 特权管理不恰当

CVE编号

CVE-2021-27851

利用情况

暂无

补丁情况

官方补丁

披露时间

2021-04-27
漏洞描述
A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://bugs.gnu.org/47229
https://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-daemon/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 gnu guix * From (including) 0.11.0 Up to (excluding) 1.2.0
运行在以下环境
系统 debian_11 guix * Up to (excluding) 1.2.0-4
运行在以下环境
系统 debian_12 guix * Up to (excluding) 1.2.0-4
运行在以下环境
系统 debian_sid guix * Up to (excluding) 1.2.0-4
阿里云评分 5.0
  • 攻击路径 本地
  • 攻击复杂度 困难
  • 权限要求 管控权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-269 特权管理不恰当
CWE-59 在文件访问前对链接解析不恰当(链接跟随)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0