2023-02-01 12:50:31 openssl security release anouncement, highest severiy is High: https://mta.openssl.org/pipermail/openssl-announce/2023-January/000248.html 2023-02-01 12:54:21 indeed 2023-02-01 12:54:23 quite some ways off 2023-02-01 12:54:46 release is on the 7th 2023-02-01 20:43:08 put it in your diaries! 2023-02-02 13:50:16 https://www.openwall.com/lists/oss-security/2023/02/02/2 + https://www.openwall.com/lists/oss-security/2023/02/02/3 2023-02-02 13:50:23 pre-auth memory corruption in openssh. 2023-02-02 14:05:19 "sshd(8): fix a pre-authentication double-free memory fault introduced in OpenSSH 9.1. This is not believed to be exploitable, and it occurs in the unprivileged pre-auth process that is subject to chroot(2) and is further sandboxed on most major platforms." 2023-02-02 16:03:41 backported anyway 2023-02-07 16:06:13 A new OpenSSL release just announced: https://mta.openssl.org/pipermail/openssl-announce/2023-February/000250.html 2023-02-08 15:41:51 I got an email re https://security.alpinelinux.org/vuln/CVE-2022-24975 2023-02-08 15:42:06 it claims that alpine 3.15-stable has it fixed 2023-02-08 15:43:11 but CVE-2022-24975 is not mentioned anywhere in any commit 2023-02-08 15:44:36 the CVE data says Max Version <= 2.35.1 2023-02-08 15:45:32 but alpine 3.15 has git 2.34.6 which to my understanding is <= 2.35.1, so it should be vulnerable? 2023-02-08 15:45:47 why does https://security.alpinelinux.org/vuln/CVE-2022-24975 say it is fixed? 2023-02-08 16:48:04 if i understand correctly, 2.34.6 is a security release for the 2.34 git branch - https://github.com/git/git/blob/master/Documentation/RelNotes/2.34.6.txt 2023-02-08 16:49:06 oh, wait, no 2023-02-08 16:49:15 CVE-2022-24975 is not mentioned there 2023-02-08 16:51:12 Ubuntu security tracker says that "--mirror appears to work as intended" and that vendor disputes the CVE 2023-02-08 16:51:41 so that's probably why 2023-02-08 18:37:45 where is that configured in security.alpinelinux.org? 2023-02-08 18:40:16 https://gitlab.alpinelinux.org/ariadne/security-rejections/-/blob/master/main.yaml#L40 2023-02-14 18:26:22 https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh another cool git vuln 2023-02-14 18:53:26 jvoisin: thanks 2023-02-14 23:02:34 hello 2023-02-14 23:03:02 any logic behind repo mirrors being plain http by default instead of https? 2023-02-14 23:05:11 you mean, not force-redirecting to https? 2023-02-14 23:05:26 or being hardcoded to http in some places 2023-02-14 23:05:33 uhm, both i guess 2023-02-14 23:05:43 in short, it doesn't matter, as all artifacts (indexes and apk files themselves) are signed 2023-02-14 23:06:05 well yeah, but there are issues outside package poisoning 2023-02-14 23:06:28 but not having a redirect to https is also useful in cases where you don't want TLS (no certificate store, etc.) 2023-02-14 23:07:23 as for the latter.. dunno, if there's no good reason to keep it as http (in that specific place), it should probably be changed to https 2023-02-14 23:39:10 "well yeah, but there are..." <- such as? 2023-02-15 01:05:47 pj: one scenario would be faking the http server + dns spoofing and replying with whatever package the user wants and sending him a 99999GB package wrecking his stuff 2023-02-15 01:06:14 that would fail signature 2023-02-15 01:07:17 but sig check happens after DLing, right? 2023-02-15 01:08:03 also an edge case would be accessing said http via browser for whatever reason and the obvious routine of the guy injecting a jsminer for a couple of secs but that's a non issue 2023-02-15 01:08:23 it's not really that big of a deal i agree but it just feels off 2023-02-15 01:19:06 browsers have https-only option 2023-02-15 01:22:14 delegating security to the client is usually a bad idea, esp since that feature is disabled by dfault 2023-02-15 01:45:03 breaking clients behaviour is always bad idea 2023-02-15 01:45:41 (current) browsers will connect to https first anyway 2023-02-15 01:59:29 fair point 2023-02-16 16:41:50 "in short, it doesn't matter..." <- Signature verification has been bypasses before with vulnerabilities in the checking process 2023-02-16 16:43:38 https://www.qubes-os.org/news/2021/03/19/qsb-067/ 2023-02-16 16:46:06 "(current) browsers will connect..." <- Some still don't enforce this by default. Edge requires you to enable it in developer options 2023-02-16 17:20:31 "Signature verification has..." <- both are hosted in same place, moot point 2023-02-16 18:37:58 "both are hosted in same place..." <- What 2023-02-16 19:04:29 https mirrors are better 2023-02-16 19:11:26 no one argued that they are not better 2023-02-17 03:23:45 it's a simple case 2023-02-17 03:23:49 you use http -> it's fast 2023-02-17 03:23:56 you use https -> it's slower 2023-02-17 03:24:02 case closed 2023-02-17 06:07:38 "no one argued that they are..." <- I don't understand what your point was 2023-02-17 06:08:04 "you use https -> it's slower" <- I've never seen a noticeable difference 2023-02-17 14:09:43 I recommend reading first 2023-02-17 14:20:35 hi there, noticed that multiple services run as root. For example iwd 2023-02-17 14:20:44 here is a grepped together ps -A: 2023-02-17 14:20:48 https://paste.gnome.org/dOPmAj5Xl 2023-02-17 14:21:59 is it possible to run iwd as non root user? 2023-02-17 14:24:53 no 2023-02-17 14:25:35 thanks :) 2023-02-17 17:02:42 "I recommend reading first" <- Reading what 2023-02-17 17:03:11 "hi there, noticed that multiple..." <- If it bothers you, try sandboxing them 2023-02-20 23:53:25 Hi! Quick question re https://security.alpinelinux.org/vuln/CVE-2022-48303 2023-02-20 23:54:02 there seems to be no fix yet consumed, and the CVE is not matching to any packages. Is this on the table? 2023-02-20 23:54:31 Latest tar https://pkgs.alpinelinux.org/package/v3.17/main/x86_64/tar does not contain any patch, from what I can tell? 2023-02-20 23:55:01 it does not 2023-02-20 23:57:20 Quick question regarding 3.16 vs 3.17 ... e.g. https://security.alpinelinux.org/vuln/CVE-2022-46663, 3.17 contains a later version of less, with the patch for this CVE consumed, 3.16 does not have this patch. Is 3.16 EOL for security patches, or is 3.16 not receiving the patch, because also here, there is no match? 2023-02-21 00:01:11 https://endoflife.date/alpine, if this info is accurate, I assume the reason is the later? But why consume the patch explicitly in 3.17, and then not add it to 3.16, was that an oversight? 2023-02-21 00:01:26 3.16 does have it fixed 2023-02-21 00:01:31 same for 3.15 and 3.14 2023-02-21 00:01:32 3.13 is eol 2023-02-21 00:01:40 i fixed it before a cve was assigned so i had nothing to fill out 2023-02-21 00:02:04 i had it fixed like 10 minutes after the report was published or something 2023-02-21 00:02:35 my bad, sorry 2023-02-21 00:03:38 fixed the tar one 2023-02-21 00:03:40 happy untarring 2023-02-21 00:04:03 with pleasure 2023-02-22 06:14:58 Always bwrap archives