Hi all,
Following up on this issue...
On Fri, Jun 9, 2023 at 12:41 PM Emilia Torino
<emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>> wrote:
Hi all,
On 9/6/23 06:20, Cristovao Cordeiro wrote:
> Sounds good to me. @Emilia Torino
> <mailto:emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>> do
you need those repos to exist in
> Docker Hub before you can onboard these?
We don't. Since we don't scan the upstream
based ROCKs (we only need
this for the deb based ones).
>
> On Fri, Jun 9, 2023 at 10:42 AM Luca
Bello <luca.bello@xxxxxxxxxxxxx
<mailto:luca.bello@xxxxxxxxxxxxx>
> <mailto:luca.bello@xxxxxxxxxxxxx
<mailto:luca.bello@xxxxxxxxxxxxx>>> wrote:
>
> Hello everyone,
>
> as mentioned before, the ROCKs we
have are all based on upstream
> projects; the list is the following,
as required:
>
> * Alertmanager
(https://github.com/prometheus/alertmanager
<https://github.com/prometheus/alertmanager>
>
<https://github.com/prometheus/alertmanager <https://github.com/prometheus/alertmanager>>)
> * Grafana Agent
(https://github.com/grafana/agent
<https://github.com/grafana/agent>
> <https://github.com/grafana/agent
<https://github.com/grafana/agent>>)
> * Grafana
(https://github.com/grafana/grafana
<https://github.com/grafana/grafana>
> <https://github.com/grafana/grafana
<https://github.com/grafana/grafana>>)
> * Loki
(https://github.com/grafana/loki
<https://github.com/grafana/loki>
> <https://github.com/grafana/loki
<https://github.com/grafana/loki>>)
> * Mimir
(https://github.com/grafana/mimir
<https://github.com/grafana/mimir>
> <https://github.com/grafana/mimir
<https://github.com/grafana/mimir>>)
> * SeaweedFS
(https://github.com/seaweedfs/seaweedfs
<https://github.com/seaweedfs/seaweedfs>
>
<https://github.com/seaweedfs/seaweedfs
<https://github.com/seaweedfs/seaweedfs>>)
> * Traefik
(https://github.com/traefik/traefik
<https://github.com/traefik/traefik>
> <https://github.com/traefik/traefik
<https://github.com/traefik/traefik>>)
>
> Please let me know if any of these
qualifies!
I am not sure how urgent is this, but if
you help me identify the Ubuntu
source packages associated we can make this
faster. Otherwise we can
work on this next week.
Did you have a chance to check this?
>
>
> Cheers,
>
> Luca
>
> On 31/05/2023 18:29, Cristovao
Cordeiro wrote:
>>
>> So the only change from our side
will be to add
>> prometheus to the email
notification subject (or I guess we
>> can just
>> simple replace it with "CVEs
potentially affecting upstream based
>> ROCKs"). Are the email
recipients the same ones for the other
>> ones?
>>
>>
>> I think that would be fine for now.
I'm reluctant to use the
>> mailing list as a catch-all, but I
think we can re-design this
>> once there is an event bus at
Canonical, so we rely less on emails.
>>
>> As for the other 10 ROCKs, @Luca Bello
>> <mailto:luca.bello@xxxxxxxxxxxxx
<mailto:luca.bello@xxxxxxxxxxxxx>> let's
first do the right due
>> diligence on those, cause if a ROCK
is not meant to be under the
>> "ubuntu" namespace, then this
security monitoring doesn't need to
>> apply.
>>
>> On Wed, May 31, 2023 at 3:58 PM
Emilia Torino
>> <emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>
<mailto:emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>>>
>> wrote:
>>
>>
>> Hi all,
>>
>> On 31/5/23 04:03, Luca Bello wrote:
>> > Hi everyone,
>> >
>> > as said in the thread already,
the prometheus image is
>> indeed a ROCK
>> > based on the
*prometheus/prometheus* repository.
>>
>> That's very convenient. But just
to be clear again, we are not
>> "inspecting" the upstream based rocks
the same way we do for
>> the deb
>> based ones. We are only
monitoring new CVEs created for
>> prometheus,
>> protobuf and consul. So the only
change from our side will be
>> to add
>> prometheus to the email
notification subject (or I guess we
>> can just
>> simple replace it with "CVEs
potentially affecting upstream based
>> ROCKs"). Are the email
recipients the same ones for the other
>> ones?
>>
>> >
>> > We're in the process of
updating all of our ROCKs in a
>> similar way,
>> > meaning we want to make sure
we are complying with any
>> guidelines you
>> > might have on them.
>> > We have about 10 ROCKs at the
moment, mostly based on
>> upstream projects
>> > just like this one. Should I
share the full list, so you can
>> track them?
>>
>> I am happy to do an analysis of
this list to see if we can add
>> more. The
>> short answer would be that if
the software is packaged as a
>> deb in main
>> or universe (which is the
situation for prometheus, protobuf
>> and consul)
>> then we can simply add them.
This is because the service is
>> based on the
>> existing CVE triage work the
security team does, which is
>> mainly for
>> debs (although now is being
extended to other ecosystems
>> because of SOSS
>> but it is still limited and
mainly supporting NVIDIA software).
>>
>> A simple improvement though
could be to map the projects to
>> the rocks so
>> you dont get a general
notification, but one per ROCK as the
>> USNs/debs
>> based service does. We can work
on adding this for the next cycle.
>>
>> >
>> >
>> > Cheers,
>> >
>> > Luca
>> >
>> >
>> > On 31/05/2023 08:12, Cristovao
Cordeiro wrote:
>> >> Thank you for the swift
action, Emilia!
>> >>
>> >> > Does this
>> >> > relate to a question being
asked some hours ago in
>> >> > ~Security
>> >>
>>
https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo <https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo> <https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo <https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo>>?
>> >>
>> >> Yes, precisely. @Luca Bello
>> <mailto:luca.bello@xxxxxxxxxxxxx
<mailto:luca.bello@xxxxxxxxxxxxx>
>> <mailto:luca.bello@xxxxxxxxxxxxx
<mailto:luca.bello@xxxxxxxxxxxxx>>> is in
>> >> the process of updating that
image and we're re-doing our
>> due diligence.
>> >> Luca can confirm, but this
seems to be a ROCK based
>> precisely on that
>> >> upstream Prometheus
repository that you are already monitoring
>> >>
>>
(https://github.com/canonical/prometheus-rock/blob/main/rockcraft.yaml#L19 <https://github.com/canonical/prometheus-rock/blob/main/rockcraft.yaml#L19> <https://github.com/canonical/prometheus-rock/blob/main/rockcraft.yaml#L19 <https://github.com/canonical/prometheus-rock/blob/main/rockcraft.yaml#L19>>).
>> >>
>> >> Can we then add this image to
your list of tracked ROCKs?
>> >>
>> >>
>> >> On Tue, May 30, 2023 at
9:45 PM Emilia Torino
>> >> <emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>
>>
<mailto:emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>>> wrote:
>> >>
>> >> Hey all,
>> >>
>> >> On 30/5/23 13:14, Emilia
Torino wrote:
>> >> > Hi Cristovao,
>> >> >
>> >> > On 30/5/23 09:41,
Cristovao Cordeiro wrote:
>> >> >> Hi Emilia,
>> >> >>
>> >> >> could you please confirm
the `prometheus` container
>> image is being
>> >> >> monitored?
>> >> >
>> >> > I don't see prometheus
being monitored by our
>> services (not as a
>> >> rock
>> >> > based on upstream source
code nor as a rock based on
>> debs). Does
>> >> this
>> >> > relate to a question being
asked some hours ago in
>> >> > ~Security
>> >>
>>
https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo <https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo> <https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo <https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo>>?
>> >> >
>> >> >
>> >> > These emails' subject only
mentions cortex and
>> telegraf, but
>> >> >> I can see
"https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>
>>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>>
>> >> >>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>
>>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>>>" in the body of the
>> >> email.
>> >> >
>> >> > Apologize for the
confusion, this sounds like a bug
>> in the email
>> >> content
>> >> > generator code. I will
take a look at it later.
>> >>
>> >> I investigated this bug and
it should be solved
>> already. There was an
>> >> issue in the past, but we
fixed it already. I thought
>> it could be
>> >> related but I see this
notification you are asking is
>> from March.
>> >> If you
>> >> check the last notification
sent on Thu, May 4, 2:03 AM
>> is correctly
>> >> reporting about a single
package (cortex only).
>> >>
>> >> Let me know if you have any
further question.
>> >>
>> >> In this case, only a new
>> >> > CVE affecting consul has
been created in our tracker
>> >> >
>> >>
>>
https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845 <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845> <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845 <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845>>.
>> >> >
>> >> > Still, this does not mean
cortex and telegraf are
>> affected,
>> >> since this
>> >> > needs triage (i.e.
understand if the code/version
>> present in the
>> >> rocks
>> >> > are indeed vulnerable).
>> >> >
>> >> > FYI the reason why
>> https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>
>>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>>
(and
>> >> also
>> >> >
https://github.com/gogo/protobuf
<https://github.com/gogo/protobuf>
>>
<https://github.com/gogo/protobuf
<https://github.com/gogo/protobuf>>) are
listed in this email, is
>> >> because
>> >> > these 3 are the *only*
upstream projects we are
>> monitoring
>> >> (because of
>> >> > the bug the 3 are
incorrectly listed in the email,
>> only consul
>> >> should
>> >> > be). In other words, we
are not scanning every
>> upstream source
>> >> project
>> >> > which is used to build
cortex and telegraf.
>> >> >
>> >> > There are reasons why this
service is very limited,
>> and I hope this
>> >> > is/was clear. Let me know
if you need more information.
>> >> >
>> >> > Emilia
>> >> >
>> >> >
>> >> >>
>> >> >> ---------- Forwarded
message ---------
>> >> >> From:
<security-team-toolbox-bot@xxxxxxxxxxxxx
<mailto:security-team-toolbox-bot@xxxxxxxxxxxxx>
>>
<mailto:security-team-toolbox-bot@xxxxxxxxxxxxx <mailto:security-team-toolbox-bot@xxxxxxxxxxxxx>>
>> >> >>
<mailto:security-team-toolbox-bot@xxxxxxxxxxxxx <mailto:security-team-toolbox-bot@xxxxxxxxxxxxx>
>>
<mailto:security-team-toolbox-bot@xxxxxxxxxxxxx <mailto:security-team-toolbox-bot@xxxxxxxxxxxxx>>>>
>> >> >> Date: Sat, Mar 11, 2023
at 6:03 AM
>> >> >> Subject:
[Ubuntu-docker-images] CVEs potentially
>> affecting
>> >> cortex and
>> >> >> telegraf
>> >> >> To:
<ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>
>>
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>>
>> >> >>
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>
>>
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>>>>,
>> >> >>
<sergio.durigan@xxxxxxxxxxxxx
<mailto:sergio.durigan@xxxxxxxxxxxxx>
>>
<mailto:sergio.durigan@xxxxxxxxxxxxx
<mailto:sergio.durigan@xxxxxxxxxxxxx>>
>> >>
<mailto:sergio.durigan@xxxxxxxxxxxxx
<mailto:sergio.durigan@xxxxxxxxxxxxx>
>>
<mailto:sergio.durigan@xxxxxxxxxxxxx
<mailto:sergio.durigan@xxxxxxxxxxxxx>>>>,
>> >> >>
<emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>
>>
<mailto:emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>>
>> >>
<mailto:emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>
>>
<mailto:emilia.torino@xxxxxxxxxxxxx
<mailto:emilia.torino@xxxxxxxxxxxxx>>>>,
>> >> >>
<alex.murray@xxxxxxxxxxxxx
<mailto:alex.murray@xxxxxxxxxxxxx>
>>
<mailto:alex.murray@xxxxxxxxxxxxx
<mailto:alex.murray@xxxxxxxxxxxxx>>
>>
<mailto:alex.murray@xxxxxxxxxxxxx
<mailto:alex.murray@xxxxxxxxxxxxx>
>>
<mailto:alex.murray@xxxxxxxxxxxxx
<mailto:alex.murray@xxxxxxxxxxxxx>>>>,
>> >> >>
<simon.aronsson@xxxxxxxxxxxxx
<mailto:simon.aronsson@xxxxxxxxxxxxx>
>>
<mailto:simon.aronsson@xxxxxxxxxxxxx
<mailto:simon.aronsson@xxxxxxxxxxxxx>>
>> >>
<mailto:simon.aronsson@xxxxxxxxxxxxx
<mailto:simon.aronsson@xxxxxxxxxxxxx>
>>
<mailto:simon.aronsson@xxxxxxxxxxxxx
<mailto:simon.aronsson@xxxxxxxxxxxxx>>>>,
>> >> >>
<dylan.stephano-shachter@xxxxxxxxxxxxx
<mailto:dylan.stephano-shachter@xxxxxxxxxxxxx>
>>
<mailto:dylan.stephano-shachter@xxxxxxxxxxxxx <mailto:dylan.stephano-shachter@xxxxxxxxxxxxx>>
>> >> >>
<mailto:dylan.stephano-shachter@xxxxxxxxxxxxx <mailto:dylan.stephano-shachter@xxxxxxxxxxxxx>
>>
<mailto:dylan.stephano-shachter@xxxxxxxxxxxxx <mailto:dylan.stephano-shachter@xxxxxxxxxxxxx>>>>
>> >> >>
>> >> >>
>> >> >> New CVEs affecting
packages used to build upstream
>> based rocks
>> >> have been
>> >> >> created in the Ubuntu CVE
tracker:
>> >> >>
>> >> >> *
https://github.com/gogo/protobuf
<https://github.com/gogo/protobuf>
>>
<https://github.com/gogo/protobuf
<https://github.com/gogo/protobuf>>
>> >>
<https://github.com/gogo/protobuf
<https://github.com/gogo/protobuf>
>>
<https://github.com/gogo/protobuf
<https://github.com/gogo/protobuf>>>:
>> >> >> *
https://github.com/hashicorp/consul
<https://github.com/hashicorp/consul>
>>
<https://github.com/hashicorp/consul
<https://github.com/hashicorp/consul>>
>> >> >>
<https://github.com/hashicorp/consul
<https://github.com/hashicorp/consul>
>>
<https://github.com/hashicorp/consul
<https://github.com/hashicorp/consul>>>:
CVE-2023-0845
>> >> >> *
https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>
>>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>>
>> >> >>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>
>>
<https://github.com/prometheus/prometheus
<https://github.com/prometheus/prometheus>>>:
>> >> >>
>> >> >> Please review your rock
to understand if it is
>> affected by
>> >> these CVEs.
>> >> >>
>> >> >> Thank you for your rock
and for attending to this
>> matter.
>> >> >>
>> >> >> References:
>> >> >>
>> >>
>>
https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845 <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845> <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845 <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845>>
>> >> >>
>> >>
>>
<https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845 <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845> <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845 <https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845>>>
>> >> >>
>> >> >>
>> >> >>
>> >> >> --
>> >> >> Mailing list:
>>
https://launchpad.net/~ubuntu-docker-images
<https://launchpad.net/~ubuntu-docker-images>
>>
<https://launchpad.net/~ubuntu-docker-images <https://launchpad.net/~ubuntu-docker-images>>
>> >> >>
<https://launchpad.net/~ubuntu-docker-images <https://launchpad.net/~ubuntu-docker-images>
>>
<https://launchpad.net/~ubuntu-docker-images <https://launchpad.net/~ubuntu-docker-images>>>
>> >> >> Post to :
>> ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>
>>
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>>
>> >> >>
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>
>>
<mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>>>
>> >> >> Unsubscribe :
>>
https://launchpad.net/~ubuntu-docker-images
<https://launchpad.net/~ubuntu-docker-images>
>>
<https://launchpad.net/~ubuntu-docker-images <https://launchpad.net/~ubuntu-docker-images>>
>> >> >>
<https://launchpad.net/~ubuntu-docker-images <https://launchpad.net/~ubuntu-docker-images>
>>
<https://launchpad.net/~ubuntu-docker-images <https://launchpad.net/~ubuntu-docker-images>>>
>> >> >> More help :
https://help.launchpad.net/ListHelp
<https://help.launchpad.net/ListHelp>
>>
<https://help.launchpad.net/ListHelp
<https://help.launchpad.net/ListHelp>>
>> >> >>
<https://help.launchpad.net/ListHelp
<https://help.launchpad.net/ListHelp>
>>
<https://help.launchpad.net/ListHelp
<https://help.launchpad.net/ListHelp>>>
>> >> >>
>> >> >>
>> >> >> --
>> >> >> Cris
>> >>
>> >>
>> >>
>> >> --
>> >> Cris
>>
>>
>>
>> --
>> Cris
> ____
>
>
>
> --
> Cris