CVE-2025-52992
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-27

Last updated on: 2025-06-30

Assigner: MITRE

Description
The Nix, Lix, and Guix package managers fail to properly set permissions when a derivation build fails. This may allow arbitrary processes to modify the content of a store outside of the build sandbox. This affects Nix before 2.24.15, 2.26.4, 2.28.4, and 2.29.1; Lix before 2.91.2, 2.92.2, and 2.93.1; and Guix before 1.4.0-38.0e79d5b.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-27
Last Modified
2025-06-30
Generated
2026-05-07
AI Q&A
2025-06-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the Nix, Lix, and Guix package managers. When a derivation build fails, these package managers fail to properly set permissions, which may allow arbitrary processes to modify the content of the store outside of the build sandbox. This can lead to unauthorized privilege escalation within the package manager environment. [1]


How can this vulnerability impact me? :

The vulnerability can allow unauthorized processes to modify files outside the intended build sandbox, potentially leading to local privilege escalation. This means an attacker with local access could manipulate build outputs or store contents, compromising system integrity and security until the vulnerability is patched. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate the vulnerability CVE-2025-52992 affecting Nix, Lix, and Guix package managers, users should update to fixed versions as soon as they become available. For Lix, users are strongly advised to upgrade to versions 2.91, 2.92, or 2.93, which include fixes such as replacing path-based operations with file descriptor-based APIs, securing build staging directories, and isolating network namespaces. On NixOS, upgrade Lix pins or apply patches manually if necessary. On non-NixOS Linux and macOS, upgrade via the Lix installer or use 'nix upgrade-nix'. For Guix, monitor for released patched versions and apply them promptly. These steps help prevent unauthorized privilege escalation by ensuring proper permission handling and sandboxing during builds. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart