/srv/irclogs.ubuntu.com/2023/11/14/#ubuntu-security.txt

=== chris14_ is now known as chris14
tewardi think CVE-2023-39361 needs some revision, reflecting info gleaned by Debian from upstream data - see https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2023-November/019622.html and https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2023-November/019623.html which is my follow up with amurray and the details I gleaned during a dive attempting to find a patch for this (as well as information about what versions are actually 02:31
tewardaffected)02:31
-ubottu:#ubuntu-security- Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit ... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361>02:31
tewardalso see https://github.com/Cacti/cacti/issues/552302:31
-ubottu:#ubuntu-security- Issue 5523 in Cacti/cacti "Please clarify status of CVE-2023–37543" [Closed]02:31
amurrayteward: I already triaged it and pushed it to the main repo just before hitting send (https://git.launchpad.net/ubuntu-cve-tracker/commit/?id=4396df8baa2542dcf9d28805b6f4ffc396e5e02c) - but the website takes 10ish minutes to update02:33
-ubottu:#ubuntu-security- Commit 4396df8 in ubuntu-cve-tracker "active/CVE-2023-39361: triage prompted by request on ubuntu-devel-discuss HEAD master"02:33
amurraytry refreshing and see if it looks better 02:33
tewardamurray: ack.  i was more just following up on my reply is all ;)02:33
tewardamurray: ye the site is slow to the point of [REDACTED] [CENSORED] [CENSORED] [REDACTED] on updates, i just wanted to make a note of what my research found and additional relevant links for adding :)02:34
tewardyay for community developer involvements ;P02:34
teward(I was checking 'cause $DAYJOB uses a Cacti server and i was supposed to see if we were impacted anyways)02:35
teward(we're not, but yay for coincidental research)02:35
amurrayalso cacti has a heap of CVEs open and as you say, it is definitely not clear which commits fix which issues - but given how many are unpatched in Ubuntu I would avoid using our package for now if you have it deployed on the internet02:35
tewardyeah we're not that stupid :p02:36
amurrayapologies, I didn't mean to imply you were - was more a general comment ;)02:36
tewardIT Security Rule #1 for teward: I'm a paranoid SOB.  I NEVER open internal syslog, etc. reporting tooling to the Internet.  VPN only :)02:36
tewardamurray: yup02:36
tewardin fact I've patched so many holes in the network that pentesters have even said "Holy... this is super secure, like even a nationstate would have problems breaching this..."02:37
tewardxD02:37
tewardamurray: to be fair, Cacti and other systems also have other CVEs by dependencies too, so they're not just Cacti CVEs.02:37
UnivrslSuprBoxteward: don't trust those pentesters, they're nation state agents! :P16:53
tewardUnivrslSuprBox: lol, I've worked with the workplace's chosen pentesters for > 10 years even outside $DAYJOB so i know them well, and can trust them20:55
tewardHey, Security Team!  I have a general question.  This came up as part of an SRU ticket that i'm on because of -sponsors subscription, but jtreg7 has a component referenced in this thread (https://bugs.launchpad.net/ubuntu/+source/openjdk-21/+bug/2036873) where it validates CA certificates in the environment against its own list of "expected certificates".  Couldn't that introduce its own security concerns as part of a build test?20:58
-ubottu:#ubuntu-security- Launchpad bug 2036873 in openjdk-21 (Ubuntu Lunar) "[SRU] Please provide openjdk-21 for focal, jammy and lunar" [Undecided, Confirmed]20:58
tewardbecause it would theoretically mean that if ca-certificates drops a certificate from trusted (read: TrustCor like situations again), the package is too fragile.20:58
tewardso wondering if there's a security impact of that test existing as part of build-testing20:58
JanCwhy would Java care about what CAs are trusted...21:11
tewardJanC: I think the underlying program that's failing - jtreg7 - is depending on it, and is why the SRU exists because the 'fix' needed to be in openjdk21:58
tewardbut i agree it shouldn't care it should be agnostic and trust whatever the system CA store says is trusted by blind default21:59
tewardlike *most* programs do21:59
JanCif an application/package explicitly needs a specific CA it could provide it as a "private" resource22:03
mdeslaurit's not uncommon for test suites to assume that the list of CA certificates come from the package, and not the system like we have on Ubuntu...jtreg is the openjdk test suite, it's just not expecting to use system certs22:19
mdeslaurI assume the whole point of jtreg checking certs is to make sure openjdk actually shipped the right ones22:19
mdeslaurthe tests simply need to be fixed or disabled22:20
JanCso they need to update that test every time a CA issues a new CA cert and asks for it to be included?  I'm not sure I understand the purpose...22:24
JanC(or asks to retire a CA cert)22:25
JanCoh, apparently they also have tests for each certificate22:28
JanCto make sure it works & is not corrupted or so?22:28
mdeslaurI dunno, but that's what test suites are for :)22:29
mdeslaurI'd have to look at what exactly it's testing for22:29
JanChttps://github.com/openjdk/jdk/blob/12fce4b715f2c8b0091f5c229fcc3e3707290489/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#L44522:32
JanCnot for all, it seems22:33
mdeslaurweird https://github.com/openjdk/jdk/commit/e6f46a43268808d0cbbb3bb93c73aa8e4cbfad8322:34
-ubottu:#ubuntu-security- Commit e6f46a4 in openjdk/jdk "8317374: Add Let's Encrypt ISRG Root X2"22:34
JanCwhy weird?22:36
mdeslaurevery time they modify a ca cert, they update the file checksum in the tests and add the cert to the tests23:52
mdeslaur*shrug*23:53

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!