Package: qgo
Version: 2.1~git-20180413-1
Tags: patch, security

Dear Maintainer,
the qgo package has mailcap entries with quoted %-escapes. That is considered 
unsafe. Proper escaping should be left to the programs using the entry.

This Lintian tag is triggered:
https://lintian.debian.org/tags/quoted-placeholder-in-mailcap-entry.html

See also grave bug #930908, which was recently closed because "a Lintian test 
already exists":
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930908

I'm using the "security" tag because the affected rules in combination with 
certain mail user agents (or document openers) are the cause of a shell command 
injection vulnerability.

If you need more information let me know.

Thanks,
MNZ
diff -ru a/debian/qgo.mime b/debian/qgo.mime
--- a/debian/qgo.mime	2012-05-19 12:29:17.000000000 +0200
+++ b/debian/qgo.mime	2021-04-23 15:53:02.013666799 +0200
@@ -1 +1 @@
-application/x-go-sgf; qgo '%s'; edit=qgo '%s'; test=test "$DISPLAY" != ""; priority=2
+application/x-go-sgf; qgo %s; edit=qgo %s; test=test "$DISPLAY" != ""; priority=2

Reply via email to