Your message dated Wed, 01 Mar 2017 13:49:16 +0000 with message-id <[email protected]> and subject line Bug#856479: fixed in srst2 0.2.0-4 has caused the Debian Bug report #856479, regarding srst2: insecure handling of system calls to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 856479: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856479 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: srst2 Version: 0.2.0-3 Severity: grave Tags: patch security Justification: user security hole Hi, srst2 uses os.popen with unquotet strings allowing users to inject system calls by preparing specifically designed fasta sequence names containing '(', ')', ';' characters and others. A patch fixing this is just in packaging SVN and will be uploaded right after the bug is published. Kind regards Andreas. -- System Information: Debian Release: 8.7 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---Source: srst2 Source-Version: 0.2.0-4 We believe that the bug you reported is fixed in the latest version of srst2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andreas Tille <[email protected]> (supplier of updated srst2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 01 Mar 2017 14:23:12 +0100 Source: srst2 Binary: srst2 Architecture: source amd64 Version: 0.2.0-4 Distribution: unstable Urgency: medium Maintainer: Debian Med Packaging Team <[email protected]> Changed-By: Andreas Tille <[email protected]> Description: srst2 - Short Read Sequence Typing for Bacterial Pathogens Closes: 856479 Changes: srst2 (0.2.0-4) unstable; urgency=medium . * Do not fail if search string contains special shell characters Closes: #856479 Checksums-Sha1: dabf6e186d872ffe98ddcdb18f74e253dfb3288e 2120 srst2_0.2.0-4.dsc 473534c01dc07936861f9a6ed3340b393e466fc6 9144 srst2_0.2.0-4.debian.tar.xz a39dd678252580fff8057aa394dd1951901bbf01 6109 srst2_0.2.0-4_amd64.buildinfo b25f62ae9e29dc7119ac76ee6c0c977e2189eaeb 60526 srst2_0.2.0-4_amd64.deb Checksums-Sha256: b931e6031f6cae834d583a424fa237ff71568b1b2788905238dced8618911676 2120 srst2_0.2.0-4.dsc 8bf33c24c87d94e36d337e422009a41a3def007ae780484e424865f3892667bd 9144 srst2_0.2.0-4.debian.tar.xz e156155b64a80db9e467e787c9ca53fc1fbf83f84c77709674f0d3d0d5ccc689 6109 srst2_0.2.0-4_amd64.buildinfo a7657978a2094676ddfe144a020eb7d5c5f008058f66a7fcb2551f0165b0d207 60526 srst2_0.2.0-4_amd64.deb Files: 083bfd8f0f0130c842983e8b745a5595 2120 science optional srst2_0.2.0-4.dsc 3b67b50c9df03e6666ec43afef3713fd 9144 science optional srst2_0.2.0-4.debian.tar.xz a1dce05680da41a578ec2f4f1b06f525 6109 science optional srst2_0.2.0-4_amd64.buildinfo ef52463297650aeafd64ca4a8e6f3373 60526 science optional srst2_0.2.0-4_amd64.deb -----BEGIN PGP SIGNATURE----- iQJFBAEBCAAvFiEE8fAHMgoDVUHwpmPKV4oElNHGRtEFAli2zHQRHHRpbGxlQGRl Ymlhbi5vcmcACgkQV4oElNHGRtHUrw/8C4g94Ws8dd7XM1l8uJQgkgloW3FPow/h lk1tXxu2AIlxrnKjICXG4BuzatXsvzr/9JvJdPaXh8PyAxswnmZo363E8xypm2qx 0DMuAxoUrH7x8wJ8T8yC/lxggbJoqY+eCFuseTiVh2+juFOtkowlPfOb4ei3jkJU 2442dwoySX0wSmo9yWE7WvqP6uAJldcQCYSr+c0t7rHTDMKP8Jh+pSFeejV4T5vJ WsMIA0oVPknLWnS/OyIDnyhlmexjQxD/ZjoLeOV1tJ0EIe85K5/ziQbrVqLWeD1K DJs3xO0kmlnNnIB/cDGIyJMddiBFW7y1hMqbEhqT+p+miT+vx8bcS7jZ04huJG/x UW8Vd6YwASGtF3MprzoBRIWSzlfg/ihiuxtLh39ig8yoCDSHMbW1L7pfLkRjo/FH A9/2FNQKXtxcKlv659x1IaY5EGvtZ3mU93cFlvx5LoYta8TX9euB7iWt9DTr2pbH ktcS6jeyweXp1Movmi9DfPLe2iPHj6GPHBotM+INPeVrEeM51xnrY4ufkjh1D+QI 6JeK5RCXRzTjz9boiq7qGD2IfvhwoYB2zb1ZkyEzp9ijleeIEubGN7207PCsR23F BxFi+Ll4Y4Ij/1cC1IPmRjHPZr7KtyVmnhCIyrOU+a1mzUFoduPRsml/oIVLufYs Pz8pd2fVfgg= =IhGV -----END PGP SIGNATURE-----
--- End Message ---

