Hi Salvatore,

Looks like we emailed concurrently :)  (or concurrently enough for my batched
mail setup).

On 26 September 2023 at 14:19, Salvatore Bonaccorso wrote:
| Hi Dirk,
| 
| On Tue, Sep 26, 2023 at 06:54:31AM -0500, Dirk Eddelbuettel wrote:
| > 
| > On 25 September 2023 at 20:58, Salvatore Bonaccorso wrote:
| > | Source: gsl
| > | Version: 2.7.1+dfsg-5
| >            ^^^^^^^^^^^^
| > | Severity: important
| > | Tags: security upstream
| > | Forwarded: https://savannah.gnu.org/bugs/?59624
| > | X-Debbugs-Cc: car...@debian.org, Debian Security Team 
<t...@security.debian.org>
| > | Control: found -1 2.6+dfsg-2
| > | 
| > | Hi,
| > | 
| > | The following vulnerability was published for gsl.
| > | 
| > | CVE-2020-35357[0]:
| > | | A buffer overflow can occur when calculating the quantile value
| > | | using the Statistics Library of GSL (GNU Scientific Library),
| > | | versions 2.5 and 2.6. Processing a maliciously crafted input data
| >              ^^^^^^^^^^^^
| > 
| > I presume this is still true?  Is the '2020' in the CVE for the year this 
is from?
| 
| I did check the source and unless I did a mistake in checking then yes
| the issue is unfixed up to 2.7.1+dfsg-5 yet, and [2] applies.

I found (thanks to your diligent links) the better upstream fix that will be
in 2.8 and used that.

| > [ I see now at [0] that is spreads 2.6 and 2.7.  Out of curiousity, who did
| > the fix for buster (security) and when ? ]
| 
| For buster: 
https://tracker.debian.org/news/1465169/accepted-gsl-25dfsg-6deb10u1-source-into-oldoldstable/

Ack. And that was only days ago so I wasn't asleep at the wheel here.

| > | | for gsl_stats_quantile_from_sorted_data of the library may lead to
| > | | unexpected application termination or arbitrary code execution.
| > | 
| > | 
| > | If you fix the vulnerability please also make sure to include the
| > | CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
| > 
| > I'll try. I think this is only the second CVE case in my nearly 30 years in 
Debian.
| 
| Thanks. Note the issue does not really warrant a DSA, I had two goals

Agreed.

| with filling the bug: make you aware of the CVE assignment so the
| issue can be fixed first in unstable and the fix land in trixie. For
| bookworm and bullseye if you have spare cycles the fix might land in a
| point release (there is one upcoming, but the window for uploads
| closing the upcoming weekend).

I am a bit on the fence as to whether it is needed but I suppose the change
in -6 would apply 'as is'.
 
| > So the debian/changelog entry needs to contain the string 'CVE-2020-35357' 
-- correct?
| 
| Yes that is good.

Perfect. I used that.

Cheers, Dirk

-- 
dirk.eddelbuettel.com | @eddelbuettel | e...@debian.org

Reply via email to