Hi Tom,

On Tue, Apr 25, 2017 at 12:12:11AM -0700, Tom Lee wrote:
> Salvatore,
> 
> Assuming you raised this on behalf of the security team (and per
> https://www.debian.org/intro/organization#security I'm assuming you are):
> 
> For a moment I thought it might be worth applying upstream's patch as a
> precaution & requesting an unblock, but it really seems like it's just a
> band-aid for a specific instances of the potential bad behavior rather than
> a full-throated fix.
> 
> Per their info from the CVE:
> 
> > This change has been shown to fix the problem in practice. However, this
> > quick fix does not technically avoid undefined behavior, as the code still
> > computes pointers that point to invalid locations before they are checked.
> > A technically-correct solution has been implemented in the next
> > commit,2ca8e41140ebc618b8fb314b393b0a507568cf21. However, as this required
> > more extensive refactoring, it is not appropriate for cherry-picking, and
> > will only land in versions 0.6 and up.
> >
> > Given that, the fact there doesn't seem to be any evidence of the
> practical aspects of the CVE outside of the Apple ecosystem and the fact
> we're in the middle of a freeze, I think I'm going to defer any changes
> directed at a "fix" until after the freeze lifts. Does that work for you?
> 
> Lastly: I'll work with my sponsor to get the 0.5.3.1-1 release uploaded as
> soon as I can once the freeze does lift, but should we perhaps leave this
> bug open until we see 0.6+ roll down from upstream with the
> "technically-correct" solution?

I completely agree with you on that! Just to make clear: I just raised
this to the BTS to have it tracked outside of the security-tracker and
be able to record the fix once it enters unstable at some point with
0.6+.

Regards and thanks a lot for your work!
Salvatore

Reply via email to