Re: [oss-security] screen: Multiple Security Issues in Screen (mostly affecting release 5.0.0 and setuid-root installations)

2025-05-13 Thread Mark Esler
Cheers for the report Matthias and SUSE Security! Could you please comment on the affectedness of upstream screen 5.0.1? https://git.savannah.gnu.org/cgit/screen.git/commit/?h=screen-v5&id=464c8d8f945f53f8cbb854517279349e09d74756 This version was released ~an hour before your initial oss post. I

[oss-security] Re: tj-action/changed-files GitHub action was compromised

2025-03-18 Thread Mark Esler
Evan (CC'd) wrote tooling to detect tj-actions/changed-files compromises over the weekend. tj-scan is now public and aims to help others review logs from their private and public repos for leaked credentials. https://github.com/chainguard-dev/tj-scan Mark On Sat, Mar 15, 2025 at 12:03 PM

[oss-security] tj-action/changed-files GitHub action was compromised

2025-03-15 Thread Mark Esler
On March 14 2025 at 16:57:45 UTC the tj-action/changed-files GitHub action was compromised with commit 0e58ed8 ("chore(deps): lock file maintenance (#2460)"). This commit was added to all 361 tagged versions of the GitHub action. This malicious commit results in a script that can leak CI/CD secrets

Re: [oss-security] issue with stuck Mitre CVE requests

2025-01-24 Thread Mark Esler
On Wed, Jan 22, 2025 at 03:18:10PM +0100, Johannes Segitz wrote: > We're not empowered to do this. We are a CNA for code that we own (e.g. > zypper), but not for arbitrary open source projects. The text of SUSE's scope [0] is similar to Canonical's [1]. We understand "All Canonical issues (includi

Re: [oss-security] Local Privilege Escalations in needrestart

2024-11-26 Thread Mark Esler
we have discovered that Perl's ScanDeps module is also > trivially exploitable through various calls to eval() ("string" eval()s, > https://perldoc.perl.org/functions/eval). Consequently and impressively, > in response to our advisory: > > - all of ScanDeps's vulnerable calls

Re: [oss-security] CUPS printing system vulnerabilities

2024-09-26 Thread Mark Esler
On Fri, Sep 27, 2024 at 01:49:52AM +0200, Solar Designer wrote: > Thanks Alan! On Twitter, Alan further clarified that "once it was clear > the info was out there, the distro makers wanted to end the embargo so > they could publish advisories telling users to disable cups-browsed > instead of wait

Re: [oss-security] Tracking down a lost CVE request (MITRE)

2024-08-14 Thread Mark Esler
MITRE is not required to assign CVEs. It is always best to work with upstream (if possible). MITRE is more likely to respond if upstream replies to your email ticket ACKing the CVE request. Otherwise, you may want to ask Red Hat's CNA to assign a CVE [0]. Upstream has already agreed that this is

Re: [oss-security] linux-distros application for CentOS Project's Hyperscale SIG

2024-07-10 Thread Mark Esler
> > Jonathan Wright from AlmaLinux can vouch for us > > > > Best regards, > > > > -- > > _o) Michel Lind > > _( ) identities: > > https://keyoxide.org/5dce2e7e9c3b1cffd335c1d78b229d2f7ccc04f2 > > I know that at least Neal Gompa i

Re: [oss-security] Security vulnerability in fprintd

2024-06-14 Thread Mark Esler
for > > graphical interface but not entirely (unless there's a way to switch to the > > requesting TTY for approval). > > > > > > Thank you! > > > > On Thu, 13 Jun 2024, 23:36 Mark Esler, wrote: > > > > > At Marco&#x

Re: [oss-security] Security vulnerability in fprintd

2024-06-13 Thread Mark Esler
At Marco's request, I am asking MITRE to either revoke CVE-2024-37408 or for MITRE to transfer CVE ownership to Canonical's CNA for revocation. On Thu, Jun 13, 2024 at 06:40:51PM +0200, Marco Trevisan wrote: > Hi Yaron, > > Thanks for taking time to look into this issue. > > We appreciate the a

Re: [oss-security] New SMTP smuggling attack

2024-05-09 Thread Mark Esler
of EOD attacks makes the recent SMTP Smuggling attacks so surprising! It is hard to believe that SMTP servers were recently vulnerable to . variations and that others still are. Thanks Solar :) Mark Esler and Bastien Roucariès signature.asc Description: PGP signature

Re: [oss-security] New SMTP smuggling attack

2024-04-30 Thread Mark Esler
safe to configure sendmail to `O RejectNUL=True` (which would break RFC 2822 section 4 [6] by rejecting email which include NUL)? What are the benefits and risks of stripping ASCII NUL and other control characters from SMTP DATA? Feedback appreciated, Mark Esler and Bastien Roucariès [0] https:/

[oss-security] Re: 83 bogus CVEs assigned to Robot Operating System (ROS)

2024-04-23 Thread Mark Esler
Reporting security issues to ROS 2 with proof of concepts and by following their disclosure policy would be appreciated and valued. https://ros.org/reps/rep-2006.html I recommend asking upstream for advice and sharing your manuscript with them. Mark Esler On 4/22/24 20:52, Yash Patel wrote

[oss-security] 83 bogus CVEs assigned to Robot Operating System (ROS)

2024-04-23 Thread Mark Esler
4-30730, CVE-2024-30733, CVE-2024-30735, CVE-2024-30736, and CVE-2024-30737 Many thanks to Florencia Cabral Berenfus for her analysis of these claims! Mark Esler [0] https://dl.acm.org/doi/abs/10.1145/3573910.3573912 [1] https://github.com/yashpatelphd/CVE-2024-30737/issues/1 [2] https://d