2024-03-11 to 2024-03-17
News
Daemon vulnerability allowing store corruption has been fixed
Daemon vulnerability allowing store corruption has been fixed
A vulnerability in the build daemon, guix-daemon
, was identified and fixed. The vulnerability would allow unprivileged users to corrupt the result of fixed-output derivations such as source code tarballs and Git checkouts, which in turn could lead to local privilege escalation.
This bug is fixed and Guix System users are advised to upgrade their system, with a command along the lines of:
sudo guix system reconfigure /run/current-system/configuration.scm sudo herd restart guix-daemon
If you are using Guix on another distro, run info "(guix) Upgrading Guix"
or visit https://guix.gnu.org/manual/devel/en/html_node/Upgrading-Guix.html to learn how to upgrade Guix.
See https://issues.guix.gnu.org/69728 for more information on this issue.