中危 gnu guix 特权管理不恰当
CVE编号
CVE-2021-27851利用情况
暂无补丁情况
官方补丁披露时间
2021-04-27漏洞描述
A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://bugs.gnu.org/47229 | |
https://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-daemon/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | gnu | guix | * | From (including) 0.11.0 | Up to (excluding) 1.2.0 | ||||
运行在以下环境 | |||||||||
系统 | debian_11 | guix | * | Up to (excluding) 1.2.0-4 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | guix | * | Up to (excluding) 1.2.0-4 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | guix | * | Up to (excluding) 1.2.0-4 |
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 管控权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-269 | 特权管理不恰当 |
CWE-59 | 在文件访问前对链接解析不恰当(链接跟随) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论