Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3958-1 | libmodule-scandeps-perl security update |
Debian DSA |
DSA-5816-1 | libmodule-scandeps-perl security update |
EUVD |
EUVD-2024-33491 | Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval(). |
Ubuntu USN |
USN-7117-1 | needrestart and Module::ScanDeps vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 26 Aug 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux Rschupp Rschupp modules\ |
|
| CPEs | cpe:2.3:a:rschupp:modules\:\:scandeps:*:*:*:*:*:perl:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux Rschupp Rschupp modules\ |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 14 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9::crb | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Tue, 03 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 22 Nov 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | module-scandeps: local privilege escalation via unsanitized input | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 19 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Module Scandeps
Module Scandeps needrestart |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:module_scandeps:needrestart:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Module Scandeps
Module Scandeps needrestart |
|
| Metrics |
ssvc
|
Tue, 19 Nov 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval(). | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-11-03T21:51:05.694Z
Reserved: 2024-10-21T21:33:36.406Z
Link: CVE-2024-10224
Updated: 2025-11-03T21:51:05.694Z
Status : Modified
Published: 2024-11-19T18:15:19.773
Modified: 2025-11-03T22:16:34.627
Link: CVE-2024-10224
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN