Package: qgo Version: 2.1~git-20180413-1 Tags: patch, security Dear Maintainer, the qgo package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry.
This Lintian tag is triggered: https://lintian.debian.org/tags/quoted-placeholder-in-mailcap-entry.html See also grave bug #930908, which was recently closed because "a Lintian test already exists": https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930908 I'm using the "security" tag because the affected rules in combination with certain mail user agents (or document openers) are the cause of a shell command injection vulnerability. If you need more information let me know. Thanks, MNZ
diff -ru a/debian/qgo.mime b/debian/qgo.mime --- a/debian/qgo.mime 2012-05-19 12:29:17.000000000 +0200 +++ b/debian/qgo.mime 2021-04-23 15:53:02.013666799 +0200 @@ -1 +1 @@ -application/x-go-sgf; qgo '%s'; edit=qgo '%s'; test=test "$DISPLAY" != ""; priority=2 +application/x-go-sgf; qgo %s; edit=qgo %s; test=test "$DISPLAY" != ""; priority=2