StackPatch is liveSee product

Back to CVE digest
CVE-2024-52867 · cross-distro fix matrix

CVE-2024-52867: guix-daemon in GNU Guix before 5ab3c4c allows privilege escalation because build outputs are accessible by local users before file metadata concerns (e.g., for setuid and setgid programs) are properly addressed. The vulnerability can be remediated within the product via certain pull, reconfigure, an

Affects 1 Linux release across 1 (distro × package) combinations.

Fix per ecosystem

Each block below is a distro release where CVE-2024-52867 has a known fix. Run the listed command on that distro to remediate.

Debian bullseye

Source: Debian Security Tracker

  • guix→ fixed in1.2.0-4+deb11u3urgency: not yet assigned
    sudo apt-get install --only-upgrade -y guix
Are YOU affected by CVE-2024-52867?

5-second check on your actual server. Reads /etc/os-release, uname -r, and the distro's package manager; matches against this same cross-source index live.

curl https://mindsparkstack.com/scan.sh | bash
Continuous monitoring beats manual checking

CVE-2024-52867dropped silently in your distro's update channel. Every new CVE is the same story. StackPatch runs the matcher hourly against all 5 sources and emails the exact remediation when something new applies to one of your servers. $99 lifetime, 50 founder seats, 30-day refund.

See StackPatch ($99 lifetime)