First published: Tue Jan 02 2018(Updated: )
GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Guixsd | <=0.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.