Name | Description |
---|---|
CVE-2023-36418 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-41051 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-35806 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-35779 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-35773 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-34687 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-34686 | Azure RTOS GUIX Studio Information Disclosure Vulnerability |
CVE-2022-34685 | Azure RTOS GUIX Studio Information Disclosure Vulnerability |
CVE-2022-30180 | Azure RTOS GUIX Studio Information Disclosure Vulnerability |
CVE-2022-30179 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-30178 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-30177 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-30176 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2022-30175 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability |
CVE-2021-27851 | A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable. |
CVE-2019-18192 | GNU Guix 1.0.1 allows local users to gain access to an arbitrary user's account because the parent directory of the user-profile directories is world writable, a similar issue to CVE-2019-17365. |
CVE-2019-17365 | Nix through 2.3 allows local users to gain access to an arbitrary user's account because the parent directory of the user-profile directories is world writable. |
CVE-2017-1000455 | GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix. |
You can also search by reference using the CVE Reference Maps.
For More Information: CVE Request Web Form (select “Other” from dropdown)
|
||