debmany in debian-goodies 0.88.1 allows attackers to execute arbitrary shell commands (because of an eval call) via a crafted .deb file. (The path is shown to the user before execution.)
{ "binaries": [ { "binary_name": "debian-goodies", "binary_version": "0.84ubuntu0.1" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-27635.json"
{ "binaries": [ { "binary_name": "debian-goodies", "binary_version": "0.87ubuntu1.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "debian-goodies", "binary_version": "0.88.1ubuntu1.3" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "debian-goodies", "binary_version": "0.63ubuntu1+esm1" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "debian-goodies", "binary_version": "0.64ubuntu0.1~esm1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "debian-goodies", "binary_version": "0.79ubuntu0.1~esm1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }