Hi Étienne,

On Fri, Jan 09, 2026 at 07:56:42PM +0100, Étienne Mollier wrote:
> Control: fixed -1 2026.01.05+ds-1
> Control: found -1 2025.01.13+ds-1
> 
> Hi Salvatore,
> 
> > The following vulnerability was published for python-parsl.
> > 
> > CVE-2026-21892[0]:
> > | Parsl is a Python parallel scripting library. A SQL Injection
> > | vulnerability exists in the parsl-visualize component of versions
> > | prior to 2026.01.05. The application constructs SQL queries using
> > | unsafe string formatting (Python % operator) with user-supplied
> > | input (workflow_id) directly from URL routes. This allows an
> > | unauthenticated attacker with access to the visualization dashboard
> > | to inject arbitrary SQL commands, potentially leading to data
> > | exfiltration or denial of service against the monitoring database.
> > | Version 2026.01.05 fixes the issue.
> > 
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> >
> > For further information see:
> > 
> > [0] https://security-tracker.debian.org/tracker/CVE-2026-21892
> >     https://www.cve.org/CVERecord?id=CVE-2026-21892
> > [1] https://github.com/Parsl/parsl/security/advisories/GHSA-f2mf-q878-gh58
> > [2] 
> > https://github.com/Parsl/parsl/commit/013a928461e70f38a33258bd525a351ed828e974
> 
> 
> Thank you for the report, on trixie side, the patch applies
> without fuzz, which heavily suggests that the code is vulnerable
> indeed and I am wrapping something up tonight, in case a
> security upload is deemed needed.

Not yet sure, my gut feeling was as this is relevant for the
visualization dashboard, that it would be enough to fix it in a point
release, but then I'm not expert with Parsl, and so would appreciate
your point of view.

> I have verified that the mitigation is already applied in the
> version 2026.01.05+ds-1 that I uploaded earlier this week in
> unstable.  I proceeded without knowing about the CVE-2026-21892,
> so it's a bit late for the d/changelog on sid side.  Should I do
> something in particular for the sid version, or that's all good
> as-is?

Yes it is all good. I did a mistake here, I had the initial tracking
even correct, I must have had a bad day as this was not the only
mistake done. In
http://salsa.debian.org/security-tracker-team/security-tracker/commit/a060535650a1285d9318f792fd3a32788d4a6fc9
I added the information on python-parsl, I even added the corret
upstream tag containing the fix, but left the state for unstable
unfixed. The later I filled a bug wihout rechecking which version we
have in unstable and if it contains the fix. My bad, apologies for
having wasted time for you.

> python-parsl was not available in bookworm and older releases.

Yupp so only trixie will be needed to get a fix.

> I wish you the best for the upcoming year.  :)

I wish you the very very same!

Regards,
Salvatore

Reply via email to