Bug 1040266 (CVE-2013-7050) - CVE-2013-7050 devscripts: code execution flaw in uscan
Summary: CVE-2013-7050 devscripts: code execution flaw in uscan
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-7050
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1040267
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-12-11 04:28 UTC by Murray McAllister
Modified: 2019-09-29 13:11 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-03-19 22:04:47 UTC
Embargoed:


Attachments (Terms of Use)

Description Murray McAllister 2013-12-11 04:28:35 UTC
A flaw was reported in the uscan script of devscripts:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849

From that bug report:

""
The newfangled debian/copyright-driven repacking can be exploited by
malicious upstream to execute arbitrary code.
""

The fix:

http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5

devscripts is not included in Fedora 18 or 19. It looks to be part of rawhide/the upcoming Fedora 20.

Although some Debian stuff is bundled in the rpmdevtools package, uscan does not appear to be.

Comment 1 Murray McAllister 2013-12-11 04:30:37 UTC
Created devscripts tracking bugs for this issue:

Affects: fedora-rawhide [bug 1040267]

Comment 2 Murray McAllister 2013-12-11 04:34:37 UTC
CVE request: http://www.openwall.com/lists/oss-security/2013/12/11/1

Comment 3 Vincent Danen 2013-12-13 18:16:02 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-7050 to
the following vulnerability:

Name: CVE-2013-7050
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7050
Assigned: 20131211
Reference: http://seclists.org/oss-sec/2013/q4/470
Reference: http://seclists.org/oss-sec/2013/q4/486
Reference: http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5
Reference: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849
Reference: http://www.securityfocus.com/bid/64241

The get_main_source_dir function in scripts/uscan.pl in devscripts
before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to
execute arbitrary commands via shell metacharacters in a directory
name.

Comment 4 Fedora Update System 2013-12-21 02:17:19 UTC
devscripts-2.13.5-2.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.