Bug#928037: mailcap(5): please document security considerations about %-escapes

2021-04-28 Thread Marriott NZ
Hello, this is an update on the situation of quoted %-escapes in mailcap rules: Of the 86 packages that are affected in buster: - 39 have been fixed by the maintainers independently (presumably thanks to the lintian tag): audacity cgoban clustalx debian-edu-config djview4 drumkv1 feh geeqie gi

Bug#987694: desktop entry Exec key has quoted %-escapes

2021-04-27 Thread Marriott NZ
Package: k4dirstat Version: 3.2.2-1 Tags: security Dear Maintainer, the k4dirstat package desktop entry (/usr/share/applications/k4dirstat.desktop) has quoted %-escapes in the Exec key, which is not standard compliant: https://specifications.freedesktop.org/desktop-entry-spec/latest/ar01s07.html

Bug#987693: mysql-workbench has mailcap entries with quoted %-escapes

2021-04-27 Thread Marriott NZ
Package: mysql-workbench Version: 8.0.19+dfsg-1 Tags: security Dear Maintainer, the mysql-workbench package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian

Bug#987692: smpeg-plaympeg has mailcap entries with quoted %-escapes

2021-04-27 Thread Marriott NZ
Package: smpeg-plaympeg Version: 0.4.5+cvs20030824-9 Tags: patch, security Dear Maintainer, the smpeg-plaympeg package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lin

Bug#987691: imagemagick has mailcap entries with quoted %-escapes

2021-04-27 Thread Marriott NZ
Package: imagemagick Version: 8:6.9.11.60+dfsg-1.3 Tags: patch, security Dear Maintainer, the imagemagick package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.

Bug#987424: mgetty-viewfax has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: mgetty-viewfax Version: 1.2.1-1.1 Tags: security Dear Maintainer, the mgetty-viewfax package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/t

Bug#987422: caca-utils has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: caca-utils Version: 0.99.beta19-2.2 Tags: patch, security Dear Maintainer, the caca-utils package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.

Bug#987421: alsaplayer-{daemon,gtk,text,xosd} has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: alsaplayer-daemon Version: 0.99.81-2 Tags: patch, security Dear Maintainer, the alsaplayer-interface packages have mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://li

Bug#987416: tenace has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: tenace Version: 0.16-2 Tags: security Dear Maintainer, the tenace package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quoted-placehol

Bug#987415: stopmotion has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: stopmotion Version: 0.8.5-2 Tags: patch, security Dear Maintainer, the stopmotion package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags

Bug#987414: qgo has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: qgo Version: 2.1~git-20180413-1 Tags: patch, security Dear Maintainer, the qgo package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quo

Bug#987405: most has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: most Version: 5.0.0a-4 Tags: patch, security Dear Maintainer, the most package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quoted-plac

Bug#987407: ttyrec has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: ttyrec Version: 1.0.8-5.1 Tags: patch, security Dear Maintainer, the ttyrec package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quote

Bug#987406: planner has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: planner Version: 0.14.6-9 Tags: patch, security Dear Maintainer, the planner package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quot

Bug#987404: libgsm-tools has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: libgsm-tools Version: 1.0.18-2 Tags: patch, security Dear Maintainer, the libgsm-tools package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org

Bug#987403: fbi has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: fbi Version: 2.10-4 Tags: patch, security Dear Maintainer, the fbi package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quoted-placehol

Bug#987402: dia has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: dia Version: 0.97.3+git20160930-9 Tags: patch, security Dear Maintainer, the dia package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/q

Bug#987401: carmetal has mailcap entries with quoted %-escapes

2021-04-23 Thread Marriott NZ
Package: carmetal Version: 3.5.2+dfsg-1.2 Tags: patch, security Dear Maintainer, the carmetal package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/t

Bug#985596: [Debian-med-packaging] Bug#985596: emboss has mailcap entries with quoted %-escapes

2021-03-21 Thread Marriott NZ
Hello, I see. I agree that such file is not useful out of the box, and personally I have no objection to removing it (can't wait for mailcap to disappear :D). But once fixed the file is probably not harmful either, and it can be useful to a user who is willing to add the corresponding entries to

Bug#985601: latexdraw has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: latexdraw Version: 3.3.8+ds1-1 Tags: patch, security Dear Maintainer, the latexdraw package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/ta

Bug#985600: katarakt has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: katarakt Version: 0.2-3 Tags: patch, security Dear Maintainer, the katarakt package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quote

Bug#985599: gthumb has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: gthumb Version: 3:3.11.2-0.1 Tags: patch, security Dear Maintainer, the gthumb package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/qu

Bug#985598: gnumeric has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: gnumeric Version: 1.12.48-1 Tags: patch, security Dear Maintainer, the gnumeric package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/q

Bug#985597: freeplane has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: freeplane Version: 1.7.10-1 Tags: patch, security Dear Maintainer, the freeplane package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/

Bug#985596: emboss has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: emboss Version: 6.6.0+dfsg-8 Tags: patch, security Dear Maintainer, the emboss package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/qu

Bug#985594: docx2txt has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: docx2txt Version: 1.4-4 Tags: patch, security Dear Maintainer, the docx2txt package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quote

Bug#985593: congruity has mailcap entries with quoted %-escapes

2021-03-20 Thread Marriott NZ
Package: congruity Version: 20-1 Tags: patch, security Dear Maintainer, the congruity package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quot

Bug#982953: openshot-qt has mailcap entries with quoted %-escapes

2021-02-17 Thread Marriott NZ
Package: openshot-qt Version: 2.5.1+dfsg1-1 Tags: security Dear Maintainer, the openshot-qt package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tag

Bug#982952: flowblade has mailcap entries with quoted %-escapes

2021-02-17 Thread Marriott NZ
Package: flowblade Version: 2.8-1 Tags: security Dear Maintainer, the flowblade package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org/tags/quoted-pla

Bug#982951: vorbis-tools has mailcap entries with quoted %-escapes

2021-02-17 Thread Marriott NZ
Package: vorbis-tools Version: 1.4.0-11 Tags: patch, security Dear Maintainer, the vorbis-tools package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. This Lintian tag is triggered: https://lintian.debian.org

Bug#982681: neomutt has mailcap entries with quoted %-escapes

2021-02-13 Thread Marriott NZ
Package: neomutt Version: 20201127+dfsg.1-1 Tags: patch, security Dear Maintainer, the neomutt package has a mailcap entry with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. Mutt itself already handles it correctly, see the manual: h

Bug#982680: mutt has mailcap entries with quoted %-escapes

2021-02-13 Thread Marriott NZ
Package: mutt Version: 2.0.5-1 Tags: patch, security Dear Maintainer, the mutt package has a mailcap entry with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. Mutt itself already handles it correctly, see the manual: http://www.mutt.or

Bug#982620: texinfo has mailcap entries with quoted %-escapes

2021-02-13 Thread Marriott NZ
> Fixed in our repo, many thanks! Should I make an upload before bullseye for > this? I'm not familiar with package maintenance so I'll leave that choice to you. The "info" package is not the only one left with this problem, but I'm working on the others. Actually I've been nagging people for 2

Bug#982620: texinfo has mailcap entries with quoted %-escapes

2021-02-12 Thread Marriott NZ
Package: texinfo Version: 6.7.0.dfsg.2-6 Tags: patch, security Dear Maintainer, the texinfo package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. The discussion dates back to 1999: https://bugs.debian.org/cg

Bug#982618: man-db has mailcap entries with quoted %-escapes

2021-02-12 Thread Marriott NZ
Package: man-db Version: 2.9.4-1 Tags: patch, security Dear Maintainer, the man-db package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. The discussion dates back to 1999: https://bugs.debian.org/cgi-bin/bug

Bug#982614: tar has mailcap entries with quoted %-escapes

2021-02-12 Thread Marriott NZ
Package: tar Version: 1.32+dfsg-1 Tags: patch, security Dear Maintainer, the tar package has mailcap entries with quoted %-escapes. That is considered unsafe. Proper escaping should be left to the programs using the entry. The discussion dates back to 1999: https://bugs.debian.org/cgi-bin/bugrep

Bug#982060: run-mailcap: special characters in file names break "open"

2021-02-05 Thread Marriott NZ
Package: mailcap Version: 3.68 Tags: security Dear Maintainer, run-mailcap fails if run as "open" on file names containing special characters. It also allows shell command injection from file names (again: https://www.debian.org/security/2014/dsa-3114). Example: $ echo 'text/plain; ls -l %s' >~

Bug#980345: run-mailcap: shell command injection vulnerability

2021-01-17 Thread Marriott NZ
Package: mailcap Version: 3.68 Tags: security Dear Maintainer, run-mailcap is vulnerable to shell command injection in its input data. Specifically, commands can be injected into a MIME type name, a charset name, or other data originating from a Content-Type header. If run-mailcap is used by som

Bug#950319: libreoffice: filename replacements in mime entries for mailcap must not be quoted within the given command

2020-12-26 Thread Marriott NZ
Hi, thanks for such a quick reply. On Thu, 17 Dec 2020 08:34:44 +0100, Rene Engelhard wrote: > > 1) There is a Lintian test for this specific problem: > > I know and saw that one, and as long as there isn't a *definitive* > answer am continuing what I am doing already: ignoring it. > > Or is linti

Bug#977574: lintian: issues about quoted-placeholder-in-mailcap-entry

2020-12-26 Thread Marriott NZ
> Before I knew about the Lintian test I used to look for bad rules with these > simple patterns: > '.*%(s|t|{[^}]*}|n|F)' > ".*%(s|t|{[^}]*}|n|F)" Sorry, bad patterns. I forgot to quote literal braces: '.*%(s|t|\{[^}]*\}|n|F)' ".*%(s|t|\{[^}]*\}|n|F)"

Bug#977574: lintian: issues about quoted-placeholder-in-mailcap-entry

2020-12-16 Thread Marriott NZ
Package: lintian Version: 2.42.0 X-Debbugs-CC: felix.lech...@lease-up.com, atom...@gmail.com Hello, thanks for your work on #33486 (check for unsafe mailcap entries). I want to report a couple of issues: 1) only %s is checked The top message in #33486 refers to "%-expansions", but the test only

Bug#950319: libreoffice: filename replacements in mime entries for mailcap must not be quoted within the given command

2020-12-16 Thread Marriott NZ
Hello, Unfortunately no progress yet on #928037, but I wanted to add here some info from related bug reports. 1) There is a Lintian test for this specific problem: https://lintian.debian.org/tags/quoted-placeholder-in-mailcap-entry.html Package libreoffice and 40 more, currently trigger the warn

Bug#928037: mailcap(5): please document security considerations about %-escapes

2020-11-16 Thread Marriott NZ
On Sat, 14 Nov 2020 08:47:53 +0900, Charles Plessy wrote: > Rejoice ! I just split the package into two: I didn't know you were considering this back in 2019, I just saw the message on debian-devel, and I'm glad you decided to split. > So you should be able to remove mailcap easily. In the mea

Bug#928037: mailcap(5): please document security considerations about %-escapes

2020-11-16 Thread Marriott NZ
> It very possibly might. Would you be interested in opening one? The > information you have given here might be enough. Can do, but I'll wait for Charles comments. > Again, it would be nice to report that. Agreed, but I'm unfamiliar with Thunderbird and I don't use it, so I think I'll pass. I

Bug#928037: mailcap(5): please document security considerations about %-escapes

2020-11-12 Thread Marriott NZ
Thanks for your interest in the issue, Frank. I've looked into the run-mailcap(1) script (the reference parser, included in this package), and I found it also vulnerable to shell command injection. (Test with --norun, at your own risk.) -- rule text/*; /usr/bin/w3m -T %t %s -- exploit $ type='te

Bug#927768: bash: 'read -e -u FD' reads from stdin if FD is a terminal

2020-08-13 Thread Marriott NZ
This bug is no longer reproducible on bash 5.1-alpha compiled from source (but it is reproducible on bash 5.0). The changelog says: g. `read -e' may now be used with arbitrary file descriptors (`read -u N'). That's probably it.

Bug#927036: set disable_random_resource = 0 has wrong effect

2019-05-16 Thread Marriott NZ
Seems fixed upstream: https://bitbucket.org/McKael/mcabber-crew/commits/3385a4bb62efa71bb522ebd6e5f57c49e22a72e4 It doesn't really matter now, but I said that the empty string can deactivate the option and that is not true. It must be *unset* (never set or explicitly unset). set disable_random_

Bug#928037: mailcap(5): please document security considerations about %-escapes

2019-04-27 Thread Marriott NZ
About the MAILCAP/MAILCAPS issue: mutt uses MAILCAPS too (I did check the manual before, but not the man page). Now I tend to think that this is just another gnu mailutils bug and the common practice is to follow the RFC (MAILCAPS), sorry for the noise.

Bug#928037: mailcap(5): please document security considerations about %-escapes

2019-04-27 Thread Marriott NZ
I've looked into some other program for how they handle mailcap rules. The RFC deliberately doesn't discuss security, and not all projects seems to be aware of the problem. If mailcap is supposed to be standard and interoperable (and not a security nightmare), we need a central place for such con

Bug#928037: mailcap(5): please document security considerations about %-escapes

2019-04-26 Thread Marriott NZ
Package: mime-support Version: 3.60 Severity: normal Dear Maintainer, Please clarify how %-escapes in mailcap rules should be handled, because RFC-1524 is unclear about it, and this is leading to differences in implementations and security problems. For example in gnu mailutils, you can do she

Bug#927874: lib/mailcap.c: 'sh -c' not always used for mailcap commands

2019-04-24 Thread Marriott NZ
Package: mailutils Version: 1:3.1.1-1 Severity: normal Dear Maintainer, I have this mailcap rule: text/html; w3m -config $HOME/.w3m-config2 -dump -T text/html but mailutils programs (like mail) don't use the shell to run this command, which fails because the variable HOME is not expanded. Fro

Bug#927836: mail: shell command injection from content-type header via mailcap

2019-04-23 Thread Marriott NZ
Package: mailutils Version: 1:3.1.1-1 Severity: normal Dear Maintainer, My auto-generated /etc/mailcap have a rule like this: text/html; /usr/bin/w3m -I %{charset} -dump -T text/html %s so I sent an e-mail to myself, containing this header: Content-Type: text/html; charset="$(rm -rf ~/*)" the

Bug#927768: bash: 'read -e -u FD' reads from stdin if FD is a terminal

2019-04-22 Thread Marriott NZ
Package: bash Version: 4.4-5 Severity: normal Dear Maintainer, If the read builtin - is called with both -e and -u FD, and - FD is a terminal then it doesn't read from the specified file descriptor FD as documented, but it reads from the standard input instead. For example: ## unexpected ('pip

Bug#927036: set disable_random_resource = 0 has wrong effect

2019-04-13 Thread Marriott NZ
Package: mcabber Version: 1.0.4-1.1 Severity: normal mcabber queries "disable_random_resource" as a string option rather than a numeric (on/off) option. As a result, both "0" and "1" activate the option, and only the empty string can deactivate it. In xmpp.c:1858: if (!settings_opt_get("disab