-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] Shipped source code is vulnerable to CVE-2019-12900 #4
Comments
Shall we move this discussion to https://github.com/haskell/bzlib, which is kinda an upstream repo? |
I have no idea. The cabal file references this repo. |
That's because the latest release is NMU from 2020 haskell-infra/hackage-trustees#262 I'd suggest you take over the package. I doubt Duncan (who is the only in uploader group at the moment) could complain. In particular, I also doubt that Duncan will notice any GitHub discussion, here or in |
I asked Duncan by email for |
All set now, Duncan granted me upload rights: https://hackage.haskell.org/package/bzlib/maintainers/ @hasufell let's continue at https://github.com/haskell/bzlib please. |
@phadej shall we archive this repo? |
bzlib/cbits/decompress.c
Line 290 in 6228696
Although it is reported that the vulnerability is not actually exploitable (under current compilers): https://gnu.wildebeest.org/blog/mjw/2019/08/02/bzip2-and-the-cve-that-wasnt/
How much of that is true with current compilers on different platforms, configurations and compilation flags is not clear to me.
The text was updated successfully, but these errors were encountered: