CVE-2024-22034

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-22034
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-22034.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-22034
Related
Published
2024-10-16T14:15:05Z
Modified
2024-10-16T18:45:32.465822Z
Summary
[none]
Details

Attackers could put the special files in .osc into the actual package sources (e.g. _apiurl). This allows the attacker to change the configuration of osc for the victim

References

Affected packages

Debian:11 / osc

Package

Name
osc
Purl
pkg:deb/debian/osc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.169.1-1
0.169.1-1.1
0.169.1-2
0.182.1-1

1.*

1.7.0-1
1.7.0-2
1.7.0-3
1.7.0-4
1.7.0-5
1.8.3-1
1.9.0-1
1.9.1-1
1.9.1-2
1.9.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / osc

Package

Name
osc
Purl
pkg:deb/debian/osc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.169.1-2
0.182.1-1

1.*

1.7.0-1
1.7.0-2
1.7.0-3
1.7.0-4
1.7.0-5
1.8.3-1
1.9.0-1
1.9.1-1
1.9.1-2
1.9.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / osc

Package

Name
osc
Purl
pkg:deb/debian/osc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.0-1

Affected versions

0.*

0.169.1-2
0.182.1-1

1.*

1.7.0-1
1.7.0-2
1.7.0-3
1.7.0-4
1.7.0-5
1.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}