Nix is a package manager for Linux and other Unix systems that makes package management reliable and reproducible. A build process has access to and can change the permissions of the build directory. After creating a setuid binary in a globally accessible location, a malicious local user can assume the permissions of a Nix daemon worker and hijack all future builds. This issue was patched in version(s) 2.23.1, 2.22.2, 2.21.3, 2.20.7, 2.19.5 and 2.18.4.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38531.json",
"cwe_ids": [
"CWE-278"
],
"cna_assigner": "GitHub_M"
}{
"versions": [
{
"introduced": "2.23.0"
},
{
"fixed": "2.23.1"
}
]
}{
"versions": [
{
"introduced": "2.22.0"
},
{
"fixed": "2.22.2"
}
]
}{
"versions": [
{
"introduced": "2.21.0"
},
{
"fixed": "2.21.3"
}
]
}{
"versions": [
{
"introduced": "2.20.0"
},
{
"fixed": "2.20.7"
}
]
}