Skip to main content

CVE-2025-59378: CWE-669 Incorrect Resource Transfer Between Spheres in GNU Guix

Medium
VulnerabilityCVE-2025-59378cvecve-2025-59378cwe-669
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: Guix

Description

In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).

AI-Powered Analysis

AILast updated: 09/15/2025, 05:47:58 UTC

Technical Analysis

CVE-2025-59378 is a medium-severity vulnerability affecting the guix-daemon component of GNU Guix, a functional package management tool and distribution. The flaw arises from an incorrect resource transfer between security spheres (CWE-669), specifically involving the handling of the content-addressed-mirrors file. An attacker with regular user privileges can exploit this vulnerability by writing to this file to create a setuid program. This crafted setuid program runs with the privileges of the build user, which is a higher-privileged account responsible for building packages. Notably, the elevated privileges persist even after the build process has ended, allowing the attacker to maintain unauthorized access at a higher privilege level. The vulnerability does not require user interaction or prior authentication, but it does require local access since the attack vector involves writing to a file managed by guix-daemon. The CVSS 3.1 base score is 5.7, reflecting a medium severity with low attack vector scope (local), low attack complexity, no privileges required, no user interaction, and a scope change due to privilege escalation. The impact includes limited confidentiality and integrity loss but no availability impact. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability highlights a critical mismanagement of privilege boundaries within the guix-daemon, potentially allowing unauthorized privilege escalation on affected systems.

Potential Impact

For European organizations using GNU Guix, especially those relying on it for package management and software deployment in development or production environments, this vulnerability poses a significant risk. The ability for a local user to escalate privileges to the build user can lead to unauthorized access to sensitive build environments, potentially exposing proprietary source code, build configurations, or credentials. This can undermine the integrity of software supply chains, which is a critical concern in Europe given the emphasis on secure software development and compliance with regulations such as the EU Cybersecurity Act and NIS Directive. While the vulnerability requires local access, insider threats or compromised user accounts could exploit this flaw to gain elevated privileges, facilitating further lateral movement or persistence within organizational networks. The lack of availability impact reduces the risk of service disruption, but the confidentiality and integrity risks remain significant, especially for organizations handling sensitive or regulated data.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running GNU Guix, enforcing strict access controls and monitoring for unauthorized file modifications, particularly to the content-addressed-mirrors file. 2) Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to limit the ability of unprivileged users to create or modify setuid binaries within the guix-daemon environment. 3) Monitor build user activities and audit file system changes related to guix-daemon to detect anomalous behavior indicative of exploitation attempts. 4) Isolate build environments using containerization or virtualization to contain potential privilege escalations. 5) Stay alert for official patches or updates from GNU Guix and apply them promptly once available. 6) Implement robust endpoint detection and response (EDR) solutions capable of identifying suspicious privilege escalation patterns. 7) Educate system administrators and developers about this vulnerability to ensure awareness and prompt response to suspicious activities. These measures go beyond generic patching advice by focusing on access control, monitoring, and environment isolation tailored to the specific exploitation vector of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c7a873484436f1fcd044a7

Added to database: 9/15/2025, 5:47:31 AM

Last enriched: 9/15/2025, 5:47:58 AM

Last updated: 9/15/2025, 6:33:44 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats