CVE-2024-25711: diffoscope Path Traversal vulnerability
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file, such as ../.ssh/id_rsa, may be disclosed to an attacker. This occurs because the value of the gpg –use-embedded-filenames option is trusted.
References
- github.com/advisories/GHSA-33w6-hvmq-gh4x
- github.com/pypa/advisory-database/tree/main/vulns/diffoscope/PYSEC-2024-41.yaml
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47
- nvd.nist.gov/vuln/detail/CVE-2024-25711
- salsa.debian.org/reproducible-builds/diffoscope
- salsa.debian.org/reproducible-builds/diffoscope/-/commit/dfed769904c27d66a14a5903823d9c8c5aae860e
- salsa.debian.org/reproducible-builds/diffoscope/-/issues/361
Detect and mitigate CVE-2024-25711 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →