Bug 1221801 (CVE-2024-29864)

Summary: VUL-0: CVE-2024-29864: distrobox: command injection in exported executables
Product: [openSUSE] openSUSE Tumbleweed Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Dario Faggioli <dfaggioli>
Status: NEW --- QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P3 - Medium CC: carlos.lopez
Version: Current   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/398523/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-03-21 09:57:29 UTC
Distrobox before 1.7.0.1 allows attackers to execute arbitrary code via command injection into exported executables.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-29864
https://www.cve.org/CVERecord?id=CVE-2024-29864
https://github.com/89luca89/distrobox/commit/82a69f0a234e73e447d0ea8c8b3443b84fd31944
https://github.com/89luca89/distrobox/issues/1275
Comment 1 Carlos López 2024-03-21 09:59:09 UTC
We have:
- openSUSE:Backports:SLE-15-SP5/distrobox 1.4.2.1
- openSUSE:Backports:SLE-15-SP6/distrobox 1.6.0.1
- openSUSE:Factory/distrobox              1.7.0.1_g7a56b6e