1
Candidate: CVE-2012-5534
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5534
5
http://www.openwall.com/lists/oss-security/2012/11/19
7
The hook_process function in the plugin API for WeeChat 0.3.0 through
8
0.3.9.1 allows remote attackers to execute arbitrary commands via shell
9
metacharacters in a command from a plugin, related to "shell expansion."
18
upstream: http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a
19
upstream_weechat: released (0.3.9.2-1)
20
hardy_weechat: ignored (reached end-of-life)
21
lucid_weechat: ignored (reached end-of-life)
22
oneiric_weechat: ignored (reached end-of-life)
23
precise_weechat: ignored (reached end-of-life)
24
precise/esm_weechat: DNE (precise was needed)
25
quantal_weechat: ignored (reached end-of-life)
26
raring_weechat: not-affected (0.3.9.2-1)
27
saucy_weechat: not-affected (0.3.9.2-1)
28
trusty_weechat: not-affected (0.3.9.2-1)
29
utopic_weechat: not-affected (0.3.9.2-1)
30
vivid_weechat: not-affected (0.3.9.2-1)
31
vivid/stable-phone-overlay_weechat: DNE
32
vivid/ubuntu-core_weechat: DNE
33
wily_weechat: not-affected (0.3.9.2-1)
34
xenial_weechat: not-affected (0.3.9.2-1)
35
yakkety_weechat: not-affected (0.3.9.2-1)
36
zesty_weechat: not-affected (0.3.9.2-1)
37
devel_weechat: not-affected (0.3.9.2-1)