On Mon, Feb 20, 2023 at 12:23:03AM +0000, 王 悉奥 wrote:
> Hello, I have a question about python3 package. Take the stable python3.9 as
> an example, the upstream has released to 3.9.16 which contains a lot of
> security fixes, like CVE-2022-37454 and CVE-2022-42919 in 3.9.16 and the
> 3.9.3 in debian seems kind of old and not safe.

The Debian security team backports fixes to the stable version whenever
possible.  At some point, bugs like CVE-2022-37454 should be fixed in
the stable release.

Bugs that affect a large number of users tend to get fixed quickly.

Then you have bugs like CVE-2022-37454 ...

   The Keccak XKCP SHA-3 reference implementation before fdc6fef has an
   integer overflow [...]

I don't even know what that *is*.  Some sort of hash algorithm?  Are
you actually using it?  It sounds pretty niche to me, but maybe I'm
grossly mistaken.

As for the other one:

   [...]local privilege escalation in a non-default configuration. The
   Python multiprocessing library, when used with the forkserver start
   method on Linux, allows pickles to be deserialized from any user in
   the same machine local network namespace [...]

That sounds more serious, although I must admit I don't know what
"pickles" are in this context, nor do I know how many users are using
this non-default configuration.

If you aren't directly affected by theses issues, I wouldn't worry about
it.  There will be a fix at some point.

If you are directly affected by one of these, then your life does become
a lot more interesting.  You'll have to make a tough decision.  Do you
wait for the security update, not knowing how long it'll take?  Do you
build upstream Python in /opt or /usr/local and use that for your critical
services?  Do you migrate the affected machine to bullseye and risk all
of the other bugs (including security bugs) that may come as a result of
using a pre-release version of Debian?  Do you take your chances with
a bullseye-backport package, if there is one, knowing that *those* receive
no security support at all?

There aren't any good answers here.

Reply via email to