Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5805-1

Debian Linux Security Advisory 5805-1 - It was discovered that the daemon of the GNU Guix functional package manager was susceptible to privilege escalation.

Packet Storm
#vulnerability#linux#debian#sap

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


Debian Security Advisory DSA-5805-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
November 08, 2024 https://www.debian.org/security/faq


Package : guix
CVE ID : not yet available

It was discovered that the daemon of the GNU Guix functional package
manager was susceptible to privilege escalation. For additional
information please refer to
https://guix.gnu.org/en/blog/2024/build-user-takeover-vulnerability/

For the stable distribution (bookworm), this problem has been fixed in
version 1.4.0-3+deb12u2.

We recommend that you upgrade your guix packages.

For the detailed security status of guix please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/guix

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmcuaRAACgkQEMKTtsN8
TjZa/Q//eoPkJt2H3eEwYAqg8KGN0HD6rJpNNIznSbFIbjBCy/Dojt1YbA/3f7LC
K4dFp6eQo59drzf2EYVyiBL3a8kXHmAa+HxCY/n//fmBBN/IzkhbXEkAfiCo5wH1
ICGb3AgNHL2q1+OllyV4PPdwo6YS97/tmUXD3rkr29yX2D8eJ3Iwyf2f9JqBMc7J
KyBTTYHk9BS0b7XqdkyYJ69WcMNEDa6peCXp11Ebvh6Zk0jo5zoYO8INzNszquKr
oyI37gEOfrEV2jzWrQCNoHeF5pz9EE5aSXrxSAPOPgkAQ4Y933tVVLoUBMHWCasz
rTS1rPPAf85V2QqAz5nHk05B4Q3v8WKhd+t0pnpLO87QXLIoas1mUUYPnwzI662i
aed//ld1LSyDkErVeXWmS5AIW2k/Z7eabmUc23MfSwgdkkBBbZz9T0Ms4VdIKyCZ
eHv6EwAt6hIXGycwuCLLGUag4q6FMMBFCAuNsBMoLn+8XbIiQImAax/0inlmuqQb
svuVk5UFp1mycwvSxZhNRm6bI1H4Q1zXFYhAE1VC1CCv9Rw/ZNySHEFRBLpUUcJj
zdkED2qh8LsigrUfxA7XXE+KIDoFzV865zNRBECxasjnVXSbQiG7R5kHx7kAPHRk
FWb+efJZbHSFSvvg9pWXRSPqYdCA7Mm+gsouvPyloVNAdo6R6yQ=
=j+rv
-----END PGP SIGNATURE-----

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution