21:00:22 #startmeeting swift 21:00:22 Meeting started Wed Jan 25 21:00:22 2023 UTC and is due to finish in 60 minutes. The chair is timburke. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:00:22 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 21:00:22 The meeting name has been set to 'swift' 21:00:33 who's here for the swift team meeting? 21:00:38 o/ 21:01:11 o/ 21:01:18 Well, I am worried. The data model is kept, yes. So not as much forceful disruption. But they were throwing a bug down every goddamn release! Always something is screwed up in their eventlet or HTTP client. 21:01:36 o/ 21:02:10 zaitcev, fair point -- good chance DHE will need to upgrade eventlet too 21:02:42 as usual, the agenda's at 21:02:44 #link https://wiki.openstack.org/wiki/Meetings/Swift 21:02:57 first up 21:03:10 #topic stable gate testing 21:03:31 Merged openstack/swift stable/train: s3api: Prevent XXE injections https://review.opendev.org/c/openstack/swift/+/871244 21:03:51 just an fyi -- last week i talked about possibly removing integrated testing from older stable branches 21:04:51 i went ahead and did that for train and ussuri. since they're in extended-maintenance mode already, i don't think there's much other notification we need to give, but wanted to make sure y'all are aware 21:05:32 that was done to work around some broken jobs that were blocking... 21:05:40 #topic CVE fixes 21:07:10 as a refresher (i think seongsoocho may not have been here for the other meetings talking about it), a vulnerability was found in s3api's XML handling 21:07:13 #link https://bugs.launchpad.net/swift/+bug/1998625 21:07:55 it allows authenticated clients to read arbitrary files off swift proxy servers 21:08:31 Yes. Now I patch it in our production swift . I tested it before, The CVE only occurs if the s3_acl option is enabled. the default is false. 21:08:40 patches have now merged to master and most open stable branches -- zed through train 21:09:44 seongsoocho, i'm pretty sure it would be exploitable via the delete-objects API -- i don't think that would be impacted by s3_acl 21:10:21 but i suppose as long as your swift is updated, it doesn't matter too much now :-) 21:10:56 patches have also been proposed to rocky and stein; i'll keep on them to get them merged 21:11:26 any comments or questions about the CVE? 21:11:59 oh.. ok.. I've only reproduced it with xml files in the body of launchpad. It can also be exploited with the delete-objects API.... 21:12:55 the unit test that was merged uses that api, fwiw -- in case you want a starting point to try it out with s3_acl disabled 21:13:40 ok I will check it. thanks 21:15:28 also on my list is to get a release together, so we have a tag we can point to that isn't affected. i'll likely also propose stable releases back through xena 21:18:07 the CVE's been my main focus for most of the last week -- i'm afraid i still haven't started on PTG prep, but i left it on the agenda to remind myself about it 21:18:17 so i think that's all i've got 21:18:22 #topic open discussion 21:18:40 anything else we should bring up this week? 21:18:40 timburke: thanks for all your work on the CVE and tests - seems like you got your priorities right :) 21:19:03 👍 thanks timburke 21:20:38 +1 timburke 21:22:15 all right, i think i'll call it then 21:22:26 thank you all for coming, and thank you for working on swift! 21:22:37 #endmeeting