Fixing glib2.0 CVE-2024-34397 in buster
Sylvain Beucler
beuc at beuc.net
Sat May 11 17:34:55 BST 2024
Hello Simon,
Markus (apo) claimed the package yesterday after your message.
For clarity I'm CC:ing him here, and I added a note in data/dla-needed.txt.
https://salsa.debian.org/security-tracker-team/security-tracker/-/blob/master/data/dla-needed.txt
Also, thanks for the testing procedure :)
Cheers!
Sylvain Beucler
Debian LTS Team
On 10/05/2024 17:02, Simon McVittie wrote:
> Please cc either me or the glib2.0 package's address on any replies that
> are relevant outside the LTS team: I am not subscribed to -lts.
>
> Normally I don't attempt to support any packages in the LTS distributions,
> but for glib2.0 I was the author of the original CVE fix and it turns
> out that I might need a buster-compatible version of it for my day job,
> so I've done a prototype backport to buster:
> https://salsa.debian.org/gnome-team/glib/-/merge_requests/39
> (git fetch https://salsa.debian.org/gnome-team/glib wip/cve-2024-34397/buster)
>
> This incorporates:
>
> * the original CVE fixes developed under embargo and released to bookworm
> and bullseye as DSA 5682-1, to unstable as 2.80.0-10, and to Ubuntu
> (the version used here is very similar to the one in bullseye, but with
> even more conflict resolution)
>
> * automated test coverage for the CVE fix, released in the same versions
> as above (again the version used here is very similar to the one in
> bullseye, with minor adjustments to avoid requiring newer APIs)
>
> * a fix for a serious regression in ibus introduced by the CVE fixes,
> released to bookworm and bullseye as DSA 5682-2, to unstable in 2.80.1-1,
> and to Ubuntu
>
> * a fix for a minor/rare memory leak introduced by a prerequisite patch
> backported as part of the CVE fixes (see #1070851), released to unstable
> in 2.80.2-1 but not yet fixed in bookworm/bullseye or Ubuntu; this seems
> low-risk, but can be dropped/reverted if it makes the LTS team unhappy
>
> Please could whoever handles this in the LTS team take over review/testing
> from this point, and let me know if there are any problems?
>
> In the newer suites, this update was accompanied by a fix for gnome-shell,
> in which screencasting/screen-recording would have regressed after fixing
> the vulnerability. In buster, my understanding is that this will not be
> necessary, because GNOME Shell 3.30.x is too old to have had the relevant
> bug; but I have not tested a full buster system.
>
> I would recommend testing:
>
> * build-time tests
>
> * autopkgtest
>
> * general use of GNOME
>
> * gnome-shell: whatever screen recording or screencasting functionality was
> present in buster, if any (I don't remember what was offered in 3.30.x)
>
> * ibus: Compose key, dead keys, and ideally non-Latin input
> (e.g. Japanese with mozc)
>
> Thanks,
> smcv
More information about the pkg-gnome-maintainers
mailing list