A flaw was reported in the uscan script of devscripts: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849 From that bug report: "" The newfangled debian/copyright-driven repacking can be exploited by malicious upstream to execute arbitrary code. "" The fix: http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5 devscripts is not included in Fedora 18 or 19. It looks to be part of rawhide/the upcoming Fedora 20. Although some Debian stuff is bundled in the rpmdevtools package, uscan does not appear to be.
Created devscripts tracking bugs for this issue: Affects: fedora-rawhide [bug 1040267]
CVE request: http://www.openwall.com/lists/oss-security/2013/12/11/1
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-7050 to the following vulnerability: Name: CVE-2013-7050 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7050 Assigned: 20131211 Reference: http://seclists.org/oss-sec/2013/q4/470 Reference: http://seclists.org/oss-sec/2013/q4/486 Reference: http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5 Reference: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849 Reference: http://www.securityfocus.com/bid/64241 The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name.
devscripts-2.13.5-2.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.