On Fri, Nov 29, 2019 at 03:16:37PM +0000, wilfried.pasca...@orange.com wrote:
> Package: pari
> Version: 2.11.1-2
> 
> Georgi Guninski disclosed on Nov 26 a vulnerability on Full Disclosure [1].
> 
> He's saying that pari/gp packages are vulnerable to an arbitrary code
> execution ; and mainstream package versions are vulnerable on Stretch
> and Buster.

Hello Wilfried,

Georgi Guninski is mistaken.
gp is a language interpretor like bash, perl and python.
They all allow arbitrary code execution.
The ability to write files and run arbitrary code is a feature and not a bug.
GP is not documented as providing an environment with security
properties, so there cannot be a vulnerability.

Cheers,
-- 
Bill. <ballo...@debian.org>

Imagine a large red swirl here. 

Reply via email to