/srv/irclogs.ubuntu.com/2022/06/09/#ubuntu-security.txt

=== Hash is now known as Enchantertim
=== Enchantertim is now known as EnchanterTim
=== EnchanterTim is now known as OpenSores
=== OpenSores is now known as Hash
hallynhey ubu-friends - libcap-ng is a bit stale, and missing capng_get_rootid() which is useful for dealing with namespaced filecaps.  The debian maintainer is not responding to my emails.  I have a working candidate package at https://launchpad.net/~serge-hallyn/+archive/ubuntu/libcap-ng , if anyone cares to take a look and consider it for jammy at least...13:46
sarnoldheya hallyn :) it might be worth following the "You know someone who seems MIA" bit of https://wiki.debian.org/Teams/MIA if the maintainer really appears to be gone :(19:04
hallynsarnold: hey - the last person to do an NMU there is actually doing a (forget what it's called) and in 10 days may be picking the package up.  (heard that after i send the msg here this morning)19:19
hallynSo it's resolving itself, over time19:19
hallynphew19:19
sarnoldhallyn: ah nice, glad to hear something is already in progress19:21
hankThe OVAL definition for CVE-2021-33912 has a bogus date20:18
ubottulibspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infra... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33912>20:18
sarnoldheh they have dates?20:23
sarnoldhttps://termbin.com/aykc20:25
hankyeah, they do have dates20:26
hankand "unknown" isn't a valid datetime format that I'm aware of20:27
sarnoldlooks like CVE-2021-33913 is the same thing20:27
ubottulibspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the len... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33913>20:27
hankyeah, looks like they're two flaws in the same revision of the software20:28
hanklooks like it's assigned to a pfsmorigo 20:32
jdstrandhey, I'm curious about the support status of openjdk-8. openjdk-8 technically only received official support in 16.04, which is out of standard support. There have been no updates for ESM in the xenial ESM archive20:34
jdstrandhistorically, Ubuntu would copy forward openjdk-8 build to newer Ubuntu releases to universe. If an openjdk-8 update is published to ESM, will that pattern continue? (eg, push to bionic or focal universe)20:35
jdstrands/update is published to ESM/update is published to xenial ESM/20:35
sarnoldhank: alright, I've pushed something that I hope will fix up the oval; I'm not sure what the oval schedule is, it's probably a few hours away20:41
sarnoldhank: thanks for letting us know, please holler if you spot anything else, or if it's not better in a bit :)20:42
hankright on, thanks a lot!20:43
pfsmorigohank, hmm, I don't recall why it's assigned to me but I can take a look to see if its feasible20:43
pfsmorigojdstrand, I'm honestly don't know how is the process for oepnjdk-8 in xenial but I'll follow-up with the team20:44
jdstrandpfsmorigo: hey, thanks! :)20:45
pfsmorigohello jdstrand, how things are going? :)20:46
jdstrandpfsmorigo: things are going well. :) how about you?20:47
pfsmorigojdstrand, cool, here is good as well 20:48

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!