First published: Wed Dec 11 2013(Updated: )
A flaw was reported in the uscan script of devscripts: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849</a> From that bug report: "" The newfangled debian/copyright-driven repacking can be exploited by malicious upstream to execute arbitrary code. "" The fix: <a href="http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5">http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5</a> devscripts is not included in Fedora 18 or 19. It looks to be part of rawhide/the upcoming Fedora 20. Although some Debian stuff is bundled in the rpmdevtools package, uscan does not appear to be.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian devscripts | <=2.13.7 | |
Debian devscripts | =2.13.0 | |
Debian devscripts | =2.13.1 | |
Debian devscripts | =2.13.2 | |
Debian devscripts | =2.13.3 | |
Debian devscripts | =2.13.4 | |
Debian devscripts | =2.13.5 | |
Debian devscripts | =2.13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-7050 is considered moderate due to the potential exploitation of the uscan script in devscripts.
To fix CVE-2013-7050, update devscripts to version 2.13.8 or later, which addresses the vulnerability.
CVE-2013-7050 affects versions of devscripts up to 2.13.7 and includes specific versions from 2.13.0 to 2.13.6.
Yes, CVE-2013-7050 can be exploited by malicious upstream actors, making it a concern for systems using vulnerable versions of devscripts.
As a workaround for CVE-2013-7050, ensure to validate upstream software and restrict the use of untrusted sources during script execution.