Search Results

There are 18 CVE Records that match your search.
Name Description
CVE-2023-36418 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-41051 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-35806 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-35779 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-35773 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-34687 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-34686 Azure RTOS GUIX Studio Information Disclosure Vulnerability
CVE-2022-34685 Azure RTOS GUIX Studio Information Disclosure Vulnerability
CVE-2022-30180 Azure RTOS GUIX Studio Information Disclosure Vulnerability
CVE-2022-30179 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-30178 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-30177 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-30176 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-30175 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2021-27851 A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable.
CVE-2019-18192 GNU Guix 1.0.1 allows local users to gain access to an arbitrary user's account because the parent directory of the user-profile directories is world writable, a similar issue to CVE-2019-17365.
CVE-2019-17365 Nix through 2.3 allows local users to gain access to an arbitrary user's account because the parent directory of the user-profile directories is world writable.
CVE-2017-1000455 GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix.
  
You can also search by reference using the CVE Reference Maps.
For More Information:  CVE Request Web Form (select “Other” from dropdown)