Hi Dirk,

On Tue, Oct 29, 2024 at 09:10:45AM -0500, Dirk Eddelbuettel wrote:
> 
> On 29 October 2024 at 07:04, Salvatore Bonaccorso wrote:
> | Control: found -1 2.7.1+dfsg-5
> | 
> | Hi Dirk,
> | 
> | Impresinve response time ;-)
> 
> Thanks ;-)
> 
> Adding an assert was an easy and obvious 'fix' to avoid allocating badly as
> they had found possible via negative index.
> 
> | On Mon, Oct 28, 2024 at 04:12:56PM -0500, Dirk Eddelbuettel wrote:
> | > 
> | > Hi Salvatore,
> | > 
> | > On 28 October 2024 at 21:55, Salvatore Bonaccorso wrote:
> | > | Source: gsl
> | > | Version: 2.8+dfsg-3
> | > | Severity: important
> | > | Tags: security upstream
> | > | Forwarded: 
> https://lists.gnu.org/archive/html/bug-gsl/2024-09/msg00000.html
> | > | X-Debbugs-Cc: [email protected], Debian Security Team 
> <[email protected]>
> | > | 
> | > | Hi,
> | > | 
> | > | The following vulnerability was published for gsl.
> | > | 
> | > | CVE-2024-50610[0]:
> | > | | GSL (GNU Scientific Library) through 2.8 has an integer signedness
> | > | | error in gsl_siman_solve_many in siman/siman.c. When params.n_tries
> | > | | is negative, incorrect memory allocation occurs.
> | > 
> | > Will do, and will try to coordinate with upstream who have not yet
> | > reacted. The same two researchers also reported in the bug-gsl list in
> | > September, no follow-up. [ Oh I see you have that message linked above 
> too. ] 
> | 
> | Right, the CVE popped up in todays new CVEs in the CVE  feelds once we
> | triaged the new CVEs.
> |   
> | > | If you fix the vulnerability please also make sure to include the
> | > | CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> | > 
> | > Will do.
> | 
> | Thanks!
> | >
> | > | For further information see:
> | > | 
> | > | [0] https://security-tracker.debian.org/tracker/CVE-2024-50610
> | > |     https://www.cve.org/CVERecord?id=CVE-2024-50610
> | > | [1] https://lists.gnu.org/archive/html/bug-gsl/2024-09/msg00000.html
> | > | 
> | > | Please adjust the affected versions in the BTS as needed.
> | > 
> | > I am a little fuzzy on that. The savannah link to the source file shows 
> that
> | > siman.c has not been updated in years so I guess we would need to update
> | > stable too?
> | 
> | I have updated the meta-data with the control command above. About
> | stable update: I do not think this warrants a security-update via a
> | DSA, but if you have a fix for stable as well, it might be included in
> | the next point release. This is happening on 9th November, and window
> | for uploads to stable closing upcoming weekend, so if you have some
> | spare cycles to prepare that update as well that would obviously be
> | great. Otherwise I do not think the issue has much urgency (correct me
> | if you think I'm wrong).
> 
> I concur. It's a border line bug report, valid but IMHO no CVE level. I think
> we can let stable rest.
>  
> | https://lists.debian.org/debian-release/2024/10/msg00151.html
> | 
> | > Then again, it's one of many (optional) optimization routines in GSL so 
> ...
> | > But if the security team feels we need to update all versions I can look 
> into
> | > that / help with that.  Would be best to double-check with you or someone
> | > else, I don't get to touch stable all that often and am likely rusty on
> | > details.
> | 
> | Again *if* you have spare cycles and can preare an update for stable
> | to be included in the next point release, the following hilights the
> | procedure:
> | 
> | 
> https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#special-case-uploads-to-the-stable-and-oldstable-distributions
> | 
> | Let me know if you need any other from me.
> 
> That was perfect and very helpful, thank you.
> 
> If we are in agreement over stable being fine as is, we should be done here
> as I see it. Correct?

Ok, right we can otherwise just ignore the issue for stable, I will
update the tracker accordingly.

Regards,
Salvatore

Reply via email to