/srv/irclogs.ubuntu.com/2021/10/26/#ubuntu-security.txt

fungianybody happen to know if there's any sru in progress for fixing CVE-2021-42096 and CVE-2021-42097 in focal's mailman package?15:24
ubottuGNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42096>15:24
ubottuGNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover). <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42097>15:24
fungiit got addressed in bionic and xenial last week15:25
grimmwareamurray, sbeattie: hey, the cvescan json is still out of date meaning we're kinda flying blind on our system patching - is there an ETA for this getting fixed?15:40
ebarrettofungi, it is on our radar to patch it for focal, if I remember correctly we have some other cves to fix for it, but we are currently sprinting so we don't have a proper ETA, but it is in our radar for sure16:17
fungiebarretto: oh, no worries, just checking whether it had fallen through the cracks. it's not urgent for me, i've just hand-patched the relevant files on our servers for the time being anyway16:19
fungiand thanks for the info!16:20
grimmwareamurray, sbeattie: equally, if the downtime is due to bugs that are addressable by contributions from people outside of canonical I'm pretty sure we could probably dedicate some time to some patches16:48
grimmware(I appreciate that's probably a stretch but you never know until you ask)16:49

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!