Suggestions for handling of condor update
Your feedback on the condor update situation (described below) would be
Several weeks ago I prepared updates for condor for jessie (then-LTS),
stretch, and buster (the latter two still under the security team
ubmrella) to address CVE-2019-18823. The description of the fix is "an
information disclosure of authentication credentials could allow an
attacker to impersonate an authenticated user and perform actions as
I messaged the security team to seek counsel regarding the best way to
proceed with the update in stretch and buster with the intent of
resolving that question before proceeding with the jessie update. The
security team asked about what sort of testing had been performed. Not
being a user of condor my ability test the changes is limited, and since
the changes involve the authentication mechanisms, it would perhaps be
unwise to publish the update without some form of testing. Thus far I
have not taken further action.
One the one hand it seems a shame to discard the prepared update, but on
the other hand the security team's concern regarding potential
regressions is quite correct.
Does anyone have any specific suggestions? That is, is anyone able to
offer to test these packages or know someone who might be able to?
Apart from that, might there be an approach to minimize the possibility
of a regression?
Roberto C. Sánchez