First published: Tue Jan 02 2018(Updated: )
GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Guix System Distribution | <=0.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000455 is classified as a moderate severity vulnerability due to the potential for unauthorized access through setuid executables.
To mitigate CVE-2017-1000455, upgrade to GNU GuixSD version 0.14.0 or later, where the hard link handling has been corrected.
CVE-2017-1000455 affects GNU GuixSD versions prior to 0.14.0, specifically up to version 0.13.0.
CVE-2017-1000455 arises from incorrect usage of POSIX hard links, which can result in setuid files being created in the system store.
Yes, CVE-2017-1000455 can lead to privilege escalation by allowing unauthorized users to execute setuid binaries.