diff options
author | GLSAMaker <glsamaker@gentoo.org> | 2024-12-11 11:59:52 +0000 |
---|---|---|
committer | Hans de Graaff <graaff@gentoo.org> | 2024-12-11 13:00:01 +0100 |
commit | 1ed583d37d854ad883f541f0015fab8bdb689869 (patch) | |
tree | 5df864d0a7cab411d0034c7ab1746c5120c34020 /glsa-202412-18.xml | |
parent | [ GLSA 202412-17 ] idna: Denial of Service (diff) | |
download | gentoo-1ed583d37d854ad883f541f0015fab8bdb689869.tar.gz gentoo-1ed583d37d854ad883f541f0015fab8bdb689869.tar.bz2 gentoo-1ed583d37d854ad883f541f0015fab8bdb689869.zip |
[ GLSA 202412-18 ] Distrobox: Arbitrary Code Execution
Bug: https://bugs.gentoo.org/927742
Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
Signed-off-by: Hans de Graaff <graaff@gentoo.org>
Diffstat (limited to 'glsa-202412-18.xml')
-rw-r--r-- | glsa-202412-18.xml | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/glsa-202412-18.xml b/glsa-202412-18.xml new file mode 100644 index 000000000000..6d486fe48840 --- /dev/null +++ b/glsa-202412-18.xml @@ -0,0 +1,42 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202412-18"> + <title>Distrobox: Arbitrary Code Execution</title> + <synopsis>A vulnerability has been discovered in Distrobox, which can lead to arbitrary code execution.</synopsis> + <product type="ebuild">distrobox</product> + <announced>2024-12-11</announced> + <revised count="1">2024-12-11</revised> + <bug>927742</bug> + <access>local</access> + <affected> + <package name="app-containers/distrobox" auto="yes" arch="*"> + <unaffected range="ge">1.7.0.1</unaffected> + <vulnerable range="lt">1.7.0.1</vulnerable> + </package> + </affected> + <background> + <p>Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Distrobox uses podman, docker or lilipod to create containers using the Linux distribution of your choice. The created container will be tightly integrated with the host, allowing sharing of the HOME directory of the user, external storage, external USB devices and graphical apps (X11/Wayland), and audio.</p> + </background> + <description> + <p>A vulnerability has been discovered in Distrobox. Please review the CVE identifier referenced below for details.</p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifier for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Distrobox users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/distrobox-1.7.0.1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-29864">CVE-2024-29864</uri> + </references> + <metadata tag="requester" timestamp="2024-12-11T11:59:52.896177Z">graaff</metadata> + <metadata tag="submitter" timestamp="2024-12-11T11:59:52.901538Z">graaff</metadata> +</glsa>
\ No newline at end of file |