Distrobox: Arbitrary Code Execution — GLSA 202412-18

A vulnerability has been discovered in Distrobox, which can lead to arbitrary code execution.

Affected packages

app-containers/distrobox on all architectures
Affected versions < 1.7.0.1
Unaffected versions >= 1.7.0.1

Background

Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Distrobox uses podman, docker or lilipod to create containers using the Linux distribution of your choice. The created container will be tightly integrated with the host, allowing sharing of the HOME directory of the user, external storage, external USB devices and graphical apps (X11/Wayland), and audio.

Description

A vulnerability has been discovered in Distrobox. Please review the CVE identifier referenced below for details.

Impact

Please review the referenced CVE identifier for details.

Workaround

There is no known workaround at this time.

Resolution

All Distrobox users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-containers/distrobox-1.7.0.1"
 

References

Release date
December 11, 2024

Latest revision
December 11, 2024: 1

Severity
normal

Exploitable
local

Bugzilla entries