13:01:19 #startmeeting CIP IRC weekly meeting 13:01:19 Meeting started Thu Oct 14 13:01:19 2021 UTC and is due to finish in 60 minutes. The chair is jki. Information about MeetBot at http://wiki.debian.org/MeetBot. 13:01:19 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 13:01:19 The meeting name has been set to 'cip_irc_weekly_meeting' 13:01:30 hi all, please say hello if you are around 13:01:31 hi 13:01:36 hello 13:01:37 hi 13:01:39 hello 13:01:44 hi 13:01:52 o/ 13:02:27 hello 13:02:38 Hi 13:02:49 full house, great 13:02:56 #topic AI review 13:03:03 1. Combine root filesystem with kselftest binary - iwamatsu & alicef 13:03:11 hi o/ 13:03:41 no update 13:03:56 the kernelci patch for using the gz isar-core-cip is almost finished and will be merged probably this week 13:04:16 \o/ 13:04:17 great! 13:04:34 yey 13:04:41 depend from how much it will take other pull request to be checked 13:04:56 that are conflicting with our pull request 13:05:17 this is only for managing gz compression 13:06:06 so I'm currently starting to test the pull request for implement isar-core-cip 13:06:41 for check that everything work correctly with kernelci 13:07:13 and maybe do some changes depending from the result 13:08:08 very good news 13:08:27 2. Document new LAVA domains in wiki - patersonc 13:08:34 Done 13:08:43 \o/ 13:09:08 3. Look into S3 artifact upload issues - patersonc 13:09:20 Not done 13:10:18 any new AIs? 13:10:35 one 13:10:35 3 13:10:42 go ahead! 13:11:33 looks like lava is using jquery 3.4.0 and could be affected by XSS CVE-2020-11023 13:12:02 I'm trying to fix it upstream but I have no replay from lavasoftware people 13:12:47 uh 13:13:03 for getting permission to send merge request 13:13:23 do we have an idea where this could be affecting security? 13:13:54 lava.ciplatform.org is using lava 13:14:06 i know 13:14:36 GKernelCI is also 13:15:06 I'm currently working on patching GKernelCI and trying to send the patch upstream if something come out 13:15:09 question is, e.g., if only authorized users to exploit that or any visitor 13:16:29 from the CVE: passing HTML containing