CVE-2024-10224

Name
CVE-2024-10224
Description
Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
issue-tracking https://www.cve.org/CVERecord?id=CVE-2024-10224
vendor-advisory https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529
third-party-advisory https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html
af854a3a-2127-422b-91ae-364da2661108 https://www.openwall.com/lists/oss-security/2024/11/19/1

Match rules

CPE URI Source package Min version Max version
module::scandeps >= 0 < 1.38

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
perl-module-scandeps edge-main 1.37-r0 Stuart Cardall <developer@it-offshore.co.uk> fixed
perl-module-scandeps 3.21-main 1.37-r0 Stuart Cardall <developer@it-offshore.co.uk> fixed