Debian Bug report logs -
#1052655
gsl: CVE-2020-35357
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Dirk Eddelbuettel <edd@debian.org>
:
Bug#1052655
; Package src:gsl
.
(Mon, 25 Sep 2023 19:03:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Dirk Eddelbuettel <edd@debian.org>
.
(Mon, 25 Sep 2023 19:03:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: gsl
Version: 2.7.1+dfsg-5
Severity: important
Tags: security upstream
Forwarded: https://savannah.gnu.org/bugs/?59624
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 2.6+dfsg-2
Hi,
The following vulnerability was published for gsl.
CVE-2020-35357[0]:
| A buffer overflow can occur when calculating the quantile value
| using the Statistics Library of GSL (GNU Scientific Library),
| versions 2.5 and 2.6. Processing a maliciously crafted input data
| for gsl_stats_quantile_from_sorted_data of the library may lead to
| unexpected application termination or arbitrary code execution.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-35357
https://www.cve.org/CVERecord?id=CVE-2020-35357
[1] https://savannah.gnu.org/bugs/?59624
[2] https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859
Regards,
Salvatore
Marked as found in versions gsl/2.6+dfsg-2.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org
.
(Mon, 25 Sep 2023 19:03:04 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org
:
Bug#1052655
; Package src:gsl
.
(Tue, 26 Sep 2023 11:57:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Dirk Eddelbuettel <edd@debian.org>
:
Extra info received and forwarded to list.
(Tue, 26 Sep 2023 11:57:02 GMT) (full text, mbox, link).
Message #12 received at 1052655@bugs.debian.org (full text, mbox, reply):
On 25 September 2023 at 20:58, Salvatore Bonaccorso wrote:
| Source: gsl
| Version: 2.7.1+dfsg-5
^^^^^^^^^^^^
| Severity: important
| Tags: security upstream
| Forwarded: https://savannah.gnu.org/bugs/?59624
| X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
| Control: found -1 2.6+dfsg-2
|
| Hi,
|
| The following vulnerability was published for gsl.
|
| CVE-2020-35357[0]:
| | A buffer overflow can occur when calculating the quantile value
| | using the Statistics Library of GSL (GNU Scientific Library),
| | versions 2.5 and 2.6. Processing a maliciously crafted input data
^^^^^^^^^^^^
I presume this is still true? Is the '2020' in the CVE for the year this is from?
[ I see now at [0] that is spreads 2.6 and 2.7. Out of curiousity, who did
the fix for buster (security) and when ? ]
| | for gsl_stats_quantile_from_sorted_data of the library may lead to
| | unexpected application termination or arbitrary code execution.
|
|
| If you fix the vulnerability please also make sure to include the
| CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
I'll try. I think this is only the second CVE case in my nearly 30 years in Debian.
So the debian/changelog entry needs to contain the string 'CVE-2020-35357' -- correct?
Dirk
| For further information see:
|
| [0] https://security-tracker.debian.org/tracker/CVE-2020-35357
| https://www.cve.org/CVERecord?id=CVE-2020-35357
| [1] https://savannah.gnu.org/bugs/?59624
| [2] https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859
|
| Regards,
| Salvatore
--
dirk.eddelbuettel.com | @eddelbuettel | edd@debian.org
Information forwarded
to debian-bugs-dist@lists.debian.org, Dirk Eddelbuettel <edd@debian.org>
:
Bug#1052655
; Package src:gsl
.
(Tue, 26 Sep 2023 12:21:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Dirk Eddelbuettel <edd@debian.org>
.
(Tue, 26 Sep 2023 12:21:03 GMT) (full text, mbox, link).
Message #17 received at 1052655@bugs.debian.org (full text, mbox, reply):
Hi Dirk,
On Tue, Sep 26, 2023 at 06:54:31AM -0500, Dirk Eddelbuettel wrote:
>
> On 25 September 2023 at 20:58, Salvatore Bonaccorso wrote:
> | Source: gsl
> | Version: 2.7.1+dfsg-5
> ^^^^^^^^^^^^
> | Severity: important
> | Tags: security upstream
> | Forwarded: https://savannah.gnu.org/bugs/?59624
> | X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
> | Control: found -1 2.6+dfsg-2
> |
> | Hi,
> |
> | The following vulnerability was published for gsl.
> |
> | CVE-2020-35357[0]:
> | | A buffer overflow can occur when calculating the quantile value
> | | using the Statistics Library of GSL (GNU Scientific Library),
> | | versions 2.5 and 2.6. Processing a maliciously crafted input data
> ^^^^^^^^^^^^
>
> I presume this is still true? Is the '2020' in the CVE for the year this is from?
I did check the source and unless I did a mistake in checking then yes
the issue is unfixed up to 2.7.1+dfsg-5 yet, and [2] applies.
> [ I see now at [0] that is spreads 2.6 and 2.7. Out of curiousity, who did
> the fix for buster (security) and when ? ]
For buster: https://tracker.debian.org/news/1465169/accepted-gsl-25dfsg-6deb10u1-source-into-oldoldstable/
> | | for gsl_stats_quantile_from_sorted_data of the library may lead to
> | | unexpected application termination or arbitrary code execution.
> |
> |
> | If you fix the vulnerability please also make sure to include the
> | CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>
> I'll try. I think this is only the second CVE case in my nearly 30 years in Debian.
Thanks. Note the issue does not really warrant a DSA, I had two goals
with filling the bug: make you aware of the CVE assignment so the
issue can be fixed first in unstable and the fix land in trixie. For
bookworm and bullseye if you have spare cycles the fix might land in a
point release (there is one upcoming, but the window for uploads
closing the upcoming weekend).
> So the debian/changelog entry needs to contain the string 'CVE-2020-35357' -- correct?
Yes that is good.
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org
:
Bug#1052655
; Package src:gsl
.
(Tue, 26 Sep 2023 12:46:58 GMT) (full text, mbox, link).
Acknowledgement sent
to Dirk Eddelbuettel <edd@debian.org>
:
Extra info received and forwarded to list.
(Tue, 26 Sep 2023 12:46:58 GMT) (full text, mbox, link).
Message #22 received at 1052655@bugs.debian.org (full text, mbox, reply):
Fix made, built, uploaded and committed to the package's salsa repo.
Dirk
--
dirk.eddelbuettel.com | @eddelbuettel | edd@debian.org
Information forwarded
to debian-bugs-dist@lists.debian.org
:
Bug#1052655
; Package src:gsl
.
(Tue, 26 Sep 2023 12:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Dirk Eddelbuettel <edd@debian.org>
:
Extra info received and forwarded to list.
(Tue, 26 Sep 2023 12:57:03 GMT) (full text, mbox, link).
Message #27 received at 1052655@bugs.debian.org (full text, mbox, reply):
Hi Salvatore,
Looks like we emailed concurrently :) (or concurrently enough for my batched
mail setup).
On 26 September 2023 at 14:19, Salvatore Bonaccorso wrote:
| Hi Dirk,
|
| On Tue, Sep 26, 2023 at 06:54:31AM -0500, Dirk Eddelbuettel wrote:
| >
| > On 25 September 2023 at 20:58, Salvatore Bonaccorso wrote:
| > | Source: gsl
| > | Version: 2.7.1+dfsg-5
| > ^^^^^^^^^^^^
| > | Severity: important
| > | Tags: security upstream
| > | Forwarded: https://savannah.gnu.org/bugs/?59624
| > | X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
| > | Control: found -1 2.6+dfsg-2
| > |
| > | Hi,
| > |
| > | The following vulnerability was published for gsl.
| > |
| > | CVE-2020-35357[0]:
| > | | A buffer overflow can occur when calculating the quantile value
| > | | using the Statistics Library of GSL (GNU Scientific Library),
| > | | versions 2.5 and 2.6. Processing a maliciously crafted input data
| > ^^^^^^^^^^^^
| >
| > I presume this is still true? Is the '2020' in the CVE for the year this is from?
|
| I did check the source and unless I did a mistake in checking then yes
| the issue is unfixed up to 2.7.1+dfsg-5 yet, and [2] applies.
I found (thanks to your diligent links) the better upstream fix that will be
in 2.8 and used that.
| > [ I see now at [0] that is spreads 2.6 and 2.7. Out of curiousity, who did
| > the fix for buster (security) and when ? ]
|
| For buster: https://tracker.debian.org/news/1465169/accepted-gsl-25dfsg-6deb10u1-source-into-oldoldstable/
Ack. And that was only days ago so I wasn't asleep at the wheel here.
| > | | for gsl_stats_quantile_from_sorted_data of the library may lead to
| > | | unexpected application termination or arbitrary code execution.
| > |
| > |
| > | If you fix the vulnerability please also make sure to include the
| > | CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
| >
| > I'll try. I think this is only the second CVE case in my nearly 30 years in Debian.
|
| Thanks. Note the issue does not really warrant a DSA, I had two goals
Agreed.
| with filling the bug: make you aware of the CVE assignment so the
| issue can be fixed first in unstable and the fix land in trixie. For
| bookworm and bullseye if you have spare cycles the fix might land in a
| point release (there is one upcoming, but the window for uploads
| closing the upcoming weekend).
I am a bit on the fence as to whether it is needed but I suppose the change
in -6 would apply 'as is'.
| > So the debian/changelog entry needs to contain the string 'CVE-2020-35357' -- correct?
|
| Yes that is good.
Perfect. I used that.
Cheers, Dirk
--
dirk.eddelbuettel.com | @eddelbuettel | edd@debian.org
Information forwarded
to debian-bugs-dist@lists.debian.org, Dirk Eddelbuettel <edd@debian.org>
:
Bug#1052655
; Package src:gsl
.
(Tue, 26 Sep 2023 14:21:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Dirk Eddelbuettel <edd@debian.org>
.
(Tue, 26 Sep 2023 14:21:05 GMT) (full text, mbox, link).
Message #32 received at 1052655@bugs.debian.org (full text, mbox, reply):
Hi Dirk,
On Tue, Sep 26, 2023 at 07:53:35AM -0500, Dirk Eddelbuettel wrote:
>
> Hi Salvatore,
>
> Looks like we emailed concurrently :) (or concurrently enough for my batched
> mail setup).
>
> On 26 September 2023 at 14:19, Salvatore Bonaccorso wrote:
> | Hi Dirk,
> |
> | On Tue, Sep 26, 2023 at 06:54:31AM -0500, Dirk Eddelbuettel wrote:
> | >
> | > On 25 September 2023 at 20:58, Salvatore Bonaccorso wrote:
> | > | Source: gsl
> | > | Version: 2.7.1+dfsg-5
> | > ^^^^^^^^^^^^
> | > | Severity: important
> | > | Tags: security upstream
> | > | Forwarded: https://savannah.gnu.org/bugs/?59624
> | > | X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
> | > | Control: found -1 2.6+dfsg-2
> | > |
> | > | Hi,
> | > |
> | > | The following vulnerability was published for gsl.
> | > |
> | > | CVE-2020-35357[0]:
> | > | | A buffer overflow can occur when calculating the quantile value
> | > | | using the Statistics Library of GSL (GNU Scientific Library),
> | > | | versions 2.5 and 2.6. Processing a maliciously crafted input data
> | > ^^^^^^^^^^^^
> | >
> | > I presume this is still true? Is the '2020' in the CVE for the year this is from?
> |
> | I did check the source and unless I did a mistake in checking then yes
> | the issue is unfixed up to 2.7.1+dfsg-5 yet, and [2] applies.
>
> I found (thanks to your diligent links) the better upstream fix that will be
> in 2.8 and used that.
Ack thanks!
> | > [ I see now at [0] that is spreads 2.6 and 2.7. Out of curiousity, who did
> | > the fix for buster (security) and when ? ]
> |
> | For buster: https://tracker.debian.org/news/1465169/accepted-gsl-25dfsg-6deb10u1-source-into-oldoldstable/
>
> Ack. And that was only days ago so I wasn't asleep at the wheel here.
>
> | > | | for gsl_stats_quantile_from_sorted_data of the library may lead to
> | > | | unexpected application termination or arbitrary code execution.
> | > |
> | > |
> | > | If you fix the vulnerability please also make sure to include the
> | > | CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> | >
> | > I'll try. I think this is only the second CVE case in my nearly 30 years in Debian.
> |
> | Thanks. Note the issue does not really warrant a DSA, I had two goals
>
> Agreed.
>
> | with filling the bug: make you aware of the CVE assignment so the
> | issue can be fixed first in unstable and the fix land in trixie. For
> | bookworm and bullseye if you have spare cycles the fix might land in a
> | point release (there is one upcoming, but the window for uploads
> | closing the upcoming weekend).
>
> I am a bit on the fence as to whether it is needed but I suppose the change
> in -6 would apply 'as is'.
ok. Yes at least for stable the thing is straightforward anyway.
>
> | > So the debian/changelog entry needs to contain the string 'CVE-2020-35357' -- correct?
> |
> | Yes that is good.
>
> Perfect. I used that.
Great. One other thing which could have been done is to close the bug
along (as the BTS can close a bug as well with multiple versions it is
not needed to keep it open until as well fixed in stable and
oldstable, it can simply be closed with each version in turn).
Thanks for your work and swift repsonses!
Regards,
Salvatore
Reply sent
to Dirk Eddelbuettel <edd@debian.org>
:
You have taken responsibility.
(Tue, 26 Sep 2023 14:45:05 GMT) (full text, mbox, link).
Notification sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Bug acknowledged by developer.
(Tue, 26 Sep 2023 14:45:05 GMT) (full text, mbox, link).
Message #37 received at 1052655-done@bugs.debian.org (full text, mbox, reply):
On 26 September 2023 at 16:19, Salvatore Bonaccorso wrote:
| Great. One other thing which could have been done is to close the bug
| along (as the BTS can close a bug as well with multiple versions it is
| not needed to keep it open until as well fixed in stable and
| oldstable, it can simply be closed with each version in turn).
Flim. I forgot as I was so much in 'CVE' mode. I usually do that quite
religiously.
CCing -done now (and in case that is 'too global', my bad once more -- please
tweak at the BTS to your liking as I will consider this now taken care of).
| Thanks for your work and swift repsonses!
My pleasure. It was a breeze given the excellent pointers you provided,
particularly to the better upstream fix.
Cheers, Dirk
--
dirk.eddelbuettel.com | @eddelbuettel | edd@debian.org
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Tue Sep 26 17:53:01 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.