- Offizieller Beitrag
Package : guix
CVE ID : CVE-2024-27297
It was discovered that insufficient restriction of unix daemon sockets in the GNU Guix functional package manager could result in sandbox bypass.
For the oldstable distribution (bullseye), this problem has been fixed in version 1.2.0-4+deb11u2.
For the stable distribution (bookworm), this problem has been fixed in version 1.4.0-3+deb12u1.
We recommend that you upgrade your guix packages.
For the detailed security status of guix please refer to its security tracker page at:
Information on source package guix
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/