CVE-2021-27851

Severity
5.5MEDIUM
EPSS
0.0%
top 87.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 26
Latest updateMay 24

Description

A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5gnu_guix/guix-daemonv0.11.0-3298-g2608e40988unspecified+1
NVDgnu/guix0.11.01.2.0
Debianguix< 1.2.0-4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-c5fp-qrw2-8x2w: A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’2022-05-24
CVEList
Local privilege escalation in GNU Guix via guix-daemon and '--keep-failed'2021-04-26
OSV
CVE-2021-27851: A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’2021-04-26

📋Vendor Advisories

1
Debian
CVE-2021-27851: guix - A security vulnerability that can lead to local privilege escalation has been fo...2021