Thursday, 2026-04-09

opendevreviewGoutham Pacha Ravi proposed openstack/ossa master: Add OSSA-2026-006 (CVE-2026-pending)  https://review.opendev.org/c/openstack/ossa/+/98216907:35
gouthamrthis is ready for review, if you have bandwidth fungi JayF rosmaita tonyb prometheanfire ^ 07:41
rosmaitaack12:03
fungichecking12:12
rosmaitagouthamr: left 2 suggestions for you on the review12:19
fungii got sideswiped by more gitea overload, so dealing with that first12:37
fungimy main feedback so far is that there are a few unnecessary sentences in the description paragraph, and the notes are superfluous as well. the advisory description only needs to explain who discovered the vulnerability, what components are affected, the risks posed by not patching, and any mitigating factors in a deployment. additional details about the bug or patch can be12:42
fungifound in the linked bug, or can go into an accompanying ossn if they're important to summarize12:42
fungii'll try to get something more thourough into a review comment when my hair's not on fire, but just remember stick to important details and keep it short so people will read and not get lost in information they don't need in order to decide whether they should apply the patch12:44
-opendevstatus- NOTICE: Anubis is now deployed on our Gitea backends, and things are back to working normally though you may notice an Anubis screen flash briefly when starting to browse opendev.org; any jobs which failed prior to 15:00 UTC today can be safely rechecked15:35
opendevreviewGoutham Pacha Ravi proposed openstack/ossa master: Add OSSA-2026-006 (CVE-2026-pending)  https://review.opendev.org/c/openstack/ossa/+/98216920:44
fungithanks!20:46
gouthamri think even without the details, the OSSA reads well now20:47
fungilgtm, i'll wait to approve until after zuul +1's it in case JayF, rosmaita, prometheanfire or tonyb are available to give it a look20:47
gouthamrso i don't think an OSSN is necessary.. i mean, a lot of the detail we removed was how the vulnerability could be exploited.. you can picture that as a consequence of XSS20:48
prometheanfirealso +220:50
fungiright, i think most of the things you removed from the description were readily apparent from the bug comments and/or patch content, but also we're available to answer questions if anyone has some20:50
rosmaitalgtm also20:51
fungiand zuul came back +1 so i've approved it now. lots of consensus20:52
fungithanks gouthamr!20:52
opendevreviewMerged openstack/ossa master: Add OSSA-2026-006 (CVE-2026-pending)  https://review.opendev.org/c/openstack/ossa/+/98216920:55
fungigouthamr: https://security.openstack.org/ossa/OSSA-2026-006.html is up now, and you can cut-n-paste https://security.openstack.org/_sources/ossa/OSSA-2026-006.rst into e-mails to openstack lists and oss-security. i'm available to approve through openstack-announce moderation. don't forget to notify mitre21:00
gouthamr\o/ you took a question out of my head21:01
fungionly one? you're doing great in that case21:02
fungiremember the template for e-mail subjects and list of ml addresses is at the bottom of https://security.openstack.org/vmt-process.html#openstack-security-advisories-ossa21:03
JayFtossed a late +2 on that, thanks21:06
gouthamr++ ty sent to three lists now21:10
gouthamrfiling mitre update, hopefully they get back to me soon-ish21:11
gouthamrand will post an update on the launchpad and keep the OSSA in-progress for the errata?21:11
fungiaccepted through the announce moderation queue21:12
fungithe gerrit hook likely closed the ossa bugtask since you included a closes-bug trailer in the ossa change. it's up to you if you want to reopen it for the errata, not strictly necessary21:13
gouthamrah, no problem, i will track this regardless21:18
fungii basically just go to sleep on it until mitre wakes me up with a cve assignment and then handle it then, and otherwise hope that i'll remember at some point to follow up if that still hasn't happened21:20
gouthamr:D these problems are very new i hope21:20
fungibut also worst case some good samaritan happens by to point out to us that we have a historical ossa still missing a cve21:20

Generated by irclog2html.py 4.1.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!