First published: Fri Jul 31 2015(Updated: )
In scripts/licensecheck.pl, there is executed code, that is vulnerable to shell command injection via shell metacharacters in filename. my $mime = `file --brief --mime --dereference $file`; Upstream patch: <a href="https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=c0687bcde23108dd42e146573c368b6905e6b8e8">https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=c0687bcde23108dd42e146573c368b6905e6b8e8</a> CVE assignment: <a href="http://www.openwall.com/lists/oss-security/2015/08/01/7">http://www.openwall.com/lists/oss-security/2015/08/01/7</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Devscripts Devel Team Devscripts | <=2.15.6 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
debian/devscripts | <=2.15.6<=2.15.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.