First published: Fri Jul 31 2015(Updated: )
In scripts/licensecheck.pl, there is executed code, that is vulnerable to shell command injection via shell metacharacters in filename. my $mime = `file --brief --mime --dereference $file`; Upstream patch: <a href="https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=c0687bcde23108dd42e146573c368b6905e6b8e8">https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=c0687bcde23108dd42e146573c368b6905e6b8e8</a> CVE assignment: <a href="http://www.openwall.com/lists/oss-security/2015/08/01/7">http://www.openwall.com/lists/oss-security/2015/08/01/7</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/devscripts | <=2.15.6<=2.15.5 | |
Debian devscripts | <=2.15.6 | |
Fedora | =21 | |
Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5704 is classified as a high severity vulnerability due to the potential for remote code execution via command injection.
To fix CVE-2015-5704, you need to update the devscripts package to a version that includes the upstream patch addressing the vulnerability.
CVE-2015-5704 affects devscripts versions up to and including 2.15.6.
Yes, CVE-2015-5704 is present in Fedora versions 21 and 22.
In CVE-2015-5704, the vulnerable component is the licensecheck.pl script in the devscripts package that is susceptible to shell command injection.