/srv/irclogs.ubuntu.com/2022/07/21/#ubuntu-security.txt

=== luis220413_ is now known as luis220413
=== cpaelzer_ is now known as cpaelzer
tomreyni guess i have to agree with someone else in #debian-security (OFTC) that (also in Ubuntu) it would seem desirable to get a higher priority on CVE-2022-34918 since there appear to be public exploits + exploitation (yes, it's a local attack, but still).20:28
ubottuAn issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918>20:28
sarnoldtomreyn: fixes are in progress; in the meantime, unprivileged user namespaces can be disabled or restricted as a mitigation20:31
sdezieltomreyn: `sudo sysctl kernel.unprivileged_userns_clone=0`20:39
sdezielI'm glad Debian/Ubuntu carry this patch cause the mainline only has `user.max_user_namespaces` which applies to root as well :/20:41
tomreynthank you, both of you. maybe the mitigation could be added to the CVE page? https://ubuntu.com/security/CVE-2022-3491820:45
ubottuAn issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918>20:45
tomreynoh sorry for spamming20:46
sarnoldheh20:46
sarnoldI wish the bot would only post those like once per hour or something20:46
sarnoldtomreyn: good idea, I added something20:51
tomreynwhat was the url again? j/k20:52
sarnoldlol20:53
sarnoldwho knows how long it is until the web version is refreshed. I can't wait to see if I got the formatting syntax correct :)20:54
tomreyni just requested for it to be manually regenerated https://github.com/canonical-web-and-design/ubuntu.com/issues/1187221:08
ubottuIssue 11872 in canonical-web-and-design/ubuntu.com "CVE tracker: Footer middots wrap to the next line before their item does" [Open]21:08
sarnold*snort*21:09
tomreynoh, and it's there now, thanks sarnold 21:09
sarnoldhmm, you reference the microk8s issue but I don't see anything about 'middots' on that microk8s page.21:10
sarnoldhah. I thought the | line was supposed to render pretty21:10
tomreynoh, thanks, i linked the wrong bug21:11

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!