=== Hash is now known as Enchantertim === Enchantertim is now known as EnchanterTim === EnchanterTim is now known as OpenSores === OpenSores is now known as Hash [13:46] hey ubu-friends - libcap-ng is a bit stale, and missing capng_get_rootid() which is useful for dealing with namespaced filecaps. The debian maintainer is not responding to my emails. I have a working candidate package at https://launchpad.net/~serge-hallyn/+archive/ubuntu/libcap-ng , if anyone cares to take a look and consider it for jammy at least... [19:04] heya hallyn :) it might be worth following the "You know someone who seems MIA" bit of https://wiki.debian.org/Teams/MIA if the maintainer really appears to be gone :( [19:19] sarnold: hey - the last person to do an NMU there is actually doing a (forget what it's called) and in 10 days may be picking the package up. (heard that after i send the msg here this morning) [19:19] So it's resolving itself, over time [19:19] phew [19:21] hallyn: ah nice, glad to hear something is already in progress [20:18] The OVAL definition for CVE-2021-33912 has a bogus date [20:18] libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infra... [20:23] heh they have dates? [20:25] https://termbin.com/aykc [20:26] yeah, they do have dates [20:27] and "unknown" isn't a valid datetime format that I'm aware of [20:27] looks like CVE-2021-33913 is the same thing [20:27] libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the len... [20:28] yeah, looks like they're two flaws in the same revision of the software [20:32] looks like it's assigned to a pfsmorigo [20:34] hey, I'm curious about the support status of openjdk-8. openjdk-8 technically only received official support in 16.04, which is out of standard support. There have been no updates for ESM in the xenial ESM archive [20:35] historically, Ubuntu would copy forward openjdk-8 build to newer Ubuntu releases to universe. If an openjdk-8 update is published to ESM, will that pattern continue? (eg, push to bionic or focal universe) [20:35] s/update is published to ESM/update is published to xenial ESM/ [20:41] hank: alright, I've pushed something that I hope will fix up the oval; I'm not sure what the oval schedule is, it's probably a few hours away [20:42] hank: thanks for letting us know, please holler if you spot anything else, or if it's not better in a bit :) [20:43] right on, thanks a lot! [20:43] hank, hmm, I don't recall why it's assigned to me but I can take a look to see if its feasible [20:44] jdstrand, I'm honestly don't know how is the process for oepnjdk-8 in xenial but I'll follow-up with the team [20:45] pfsmorigo: hey, thanks! :) [20:46] hello jdstrand, how things are going? :) [20:47] pfsmorigo: things are going well. :) how about you? [20:48] jdstrand, cool, here is good as well