Bug 854878 (CVE-2013-7050) - VUL-0: CVE-2013-7050: devscripts: (uscan) command execution flaw
Summary: VUL-0: CVE-2013-7050: devscripts: (uscan) command execution flaw
Status: RESOLVED FIXED
Alias: CVE-2013-7050
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.1
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Forgotten User uM1-kgIFHl
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-11 07:55 UTC by Sebastian Krahmer
Modified: 2015-04-01 11:55 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Swamp Workflow Management 2013-12-11 23:00:31 UTC
bugbot adjusting priority
Comment 2 Alexander Bergmann 2013-12-13 17:21:39 UTC
CVE-2013-7050 was assigned to this issue.
Comment 3 Alexander Bergmann 2014-01-10 15:37:12 UTC
cve.mitre.org:

"The get_main_source_dir function in scripts/uscan.pl in devscripts
before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to
execute arbitrary commands via shell metacharacters in a directory
name."

The fix:

http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5
Comment 4 Alexander Bergmann 2014-01-10 15:40:24 UTC
Fix together with bnc#855441.
Comment 5 Johannes Segitz 2015-04-01 11:55:51 UTC
not vulnerable in openSUSE>=13.1