[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] [notification] CVE-2013-6888: uscan: remote code execution
From:       Raphael Geissert <geissert () debian ! org>
Date:       2014-01-06 10:57:06
Message-ID: CAA7hUgFLwK1dNUyCd4FZMFF_jjjfWDqK5jn5Pb4aS6wA58vTsw () mail ! gmail ! com
[Download RAW message or body]

Hi,

Given the recent issues in uscan (part of devscripts) I took a look at
it and found a few other issues.
The bugs fixed by the following commit basically allow remote code
execution when uscan is used to download upstream's tarball. With and
without repacking (contrary to the commit message).

http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=02c6850d973e3e1246fde72edab27f03d63acc52


This was assigned CVE-2013-6888.

Two other changes were made that IMO should be considered as hardening:
http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=4b7e58ee6000cdefac0682601cec6ecce0137467
 http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=b815aa438f018b5afc566eb403b0319a99a32995


At least I'm not aware of a way to exploit them.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic