guix-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

branch master updated: website: 2024-10-21-security-advisory: Add CVE ID


From: Ludovic Courtès
Subject: branch master updated: website: 2024-10-21-security-advisory: Add CVE ID.
Date: Wed, 20 Nov 2024 16:32:31 -0500

This is an automated email from the git hooks/post-receive script.

civodul pushed a commit to branch master
in repository guix-artwork.

The following commit(s) were added to refs/heads/master by this push:
     new 54705b4  website: 2024-10-21-security-advisory: Add CVE ID.
54705b4 is described below

commit 54705b498bab423c2e5f53cba4aa0be73fbaa239
Author: Ludovic Courtès <ludo@gnu.org>
AuthorDate: Wed Nov 20 22:31:07 2024 +0100

    website: 2024-10-21-security-advisory: Add CVE ID.
    
    * website/posts/2024-10-21-security-advisory.md: Add CVE ID prominently.
---
 website/posts/2024-10-21-security-advisory.md | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/website/posts/2024-10-21-security-advisory.md 
b/website/posts/2024-10-21-security-advisory.md
index 613232d..9d16a5c 100644
--- a/website/posts/2024-10-21-security-advisory.md
+++ b/website/posts/2024-10-21-security-advisory.md
@@ -1,9 +1,10 @@
-title: Build User Takeover Vulnerability
+title: Build User Takeover Vulnerability (CVE-2024-52867)
 author: Caleb Ristvedt
 tags: Security Advisory
 date: 2024-10-21 11:00
+slug: build-user-takeover-vulnerability
 ---
-A security issue has been identified in
+A security issue, known as 
[**CVE-2024-52867**](https://nvd.nist.gov/vuln/detail/CVE-2024-52867), has been 
identified in
 
[`guix-daemon`](https://guix.gnu.org/en/manual/devel/en/html_node/Invoking-guix_002ddaemon.html)
 which allows for a local user to gain the privileges of any of the build users
 and subsequently use this to manipulate the output of any build.  You



reply via email to

[Prev in Thread] Current Thread [Next in Thread]