Bugzilla – Bug 855340
VUL-0: CVE-2013-7069: ack: potential remote code execution via per-project .ackrc files
Last modified: 2015-02-18 23:02:30 UTC
Public via bugs.debian.org: Package: ack-grep Version: 2.10-1 Severity: grave Tags: security upstream fixed-upstream pending Forwarded: https://github.com/petdance/ack2/issues/399 Upstream fixed a security issue which could possibly lead to a remote code execution. Several options to ack take perl or shell code which will be executed. Since ack 2.0, ack also parses per-project .ackrc files which may e.g. come from a freshly checked out VCS repository or from a downloaded and unpacked tar ball. CVE-2013-7069 was assigned to this issue. References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731848 https://bugzilla.redhat.com/show_bug.cgi?id=1040228
bugbot adjusting priority
FWIW, our package-name for ack-grep is just 'ack'.
CVE-2013-7069: CVSS v2 Base Score: 6.8 (MEDIUM) (AV:N/AC:M/Au:N/C:P/I:P/A:P): Code Injection (CWE-94)
openSUSE 13.1 ack 2.04 affected. openSUSE 12.3 ack 1.96 not affected. openSUSE 12.2 ack 1.96 not affected. SLE would therefore not be affected. Fixing where applicable.
SR to utilities: https://build.opensuse.org/request/show/214309 MR for 13.1: https://build.opensuse.org/request/show/214312 Please review.
This is an autogenerated message for OBS integration: This bug (855340) was mentioned in https://build.opensuse.org/request/show/214382 Factory / ack
Maintenance 2500 running.
released
openSUSE-SU-2014:0142-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 855340 CVE References: CVE-2013-7069 Sources used: openSUSE 13.1 (src): ack-2.12-3.4.1