=== wbrawner0 is now known as wbrawner [22:16] I found another CVE OVAL false positive. In my Ubuntu 20.04 system, I am using the kernel in the linux source package (5.4 series), that was marked as fixed for CVE-2022-32250 on July 13 (UTC). I ran the scan on July 19 (also UTC). [22:16] net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free. [22:18] * In one of my Ubuntu 20.04 systems [22:26] Please remove the jquery source package from the entry for CVE-2022-31147 in the Ubuntu CVE Tracker because that package does not contain the jQuery Validation Plugin. [22:26] The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch. [22:26] Does Ubuntu provide a package for this jQuery plugin? [22:27] https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-31147 [22:27] The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch. [22:28] luis220413: re the oval, did you reboot into a fixed kernel? [22:29] sarnold: I always reboot after receiving a kernel update. [22:32] The source package links on packages.ubuntu.com link to files in archive.ubuntu.com, which is HTTP-only (problematic in Firefox's HTTPS-Only Mode). [22:35] tsimonq2: There is no jQuery Validation Plugin package in Ubuntu. So all packages should be removed from these two CVEs (not the kernel one). [22:35] sarnold: ^ [22:35] Wait, currently testing 18.04, 22.04 and 22.10. [22:35] *Kinetic [23:00] sarnold: Confirmed. Please remove all packages from CVE-2021-43306 and CVE-2022-31147 in the Ubuntu CVE Tracker. [23:00] An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method [23:00] The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch. [23:12] I will leave now but will see your replies in the logs for this channel.