UBUNTU-CVE-2024-36050

Source
https://ubuntu.com/security/CVE-2024-36050
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36050.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2024-36050
Related
Published
2024-05-18T22:15:00Z
Modified
2024-10-15T14:14:45Z
Summary
[none]
Details

Nix through 2.22.1 mishandles certain usage of hash caches, which makes it easier for attackers to replace current source code with attacker-controlled source code by luring a maintainer into accepting a malicious pull request.

References

Affected packages

Ubuntu:22.04:LTS / nix

Package

Name
nix
Purl
pkg:deb/ubuntu/nix?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.3.10+dfsg1-1
2.3.10+dfsg1-1build1
2.6.0+dfsg-2
2.6.0+dfsg-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / nix

Package

Name
nix
Purl
pkg:deb/ubuntu/nix?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.18.1+dfsg-1ubuntu5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / nix

Package

Name
nix
Purl
pkg:deb/ubuntu/nix?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.16.1+dfsg-3ubuntu1
2.18.1+dfsg-1ubuntu1
2.18.1+dfsg-1ubuntu2
2.18.1+dfsg-1ubuntu4
2.18.1+dfsg-1ubuntu5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}