[Bug 2080267] Re: Please add -fhardened to default build flags

2024-09-10 Thread Kees Cook
This looks great! Also, it seems that auto-var-init was (thankfully) adjusted to "=zero" at some point recently: https://gcc.gnu.org/onlinedocs/gcc/Instrumentation-Options.html#index-fhardened -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to U

[Bug 2073267] Re: Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4

2024-08-02 Thread Kees Cook
Right, yeah, I don't mean that universally disabling the kstack randomization is the permanent solution. It should be possible to add a patch to Ubuntu's kernel to restore the prior bit width to deal with Virtualbox. -- You received this bug notification because you are a member of Ubuntu Bugs, w

[Bug 2073267] Re: Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4

2024-08-01 Thread Kees Cook
Anyone affected by this should be able to boot with "randomize_kstack_offset=off" on the kernel command line to disable the offset randomization. No need to upgrade anything nor revert anything. :P -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1013012] Re: regression with sendmail and Android clients

2022-05-23 Thread Kees Cook
No current issues with modern android and modern ubuntu ** Changed in: openssl (Ubuntu) Status: Incomplete => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1013012 Title: regres

[Bug 1972043] Re: Please add -ftrivial-auto-var-init=zero to default build flags

2022-05-12 Thread Kees Cook
Adding it to the compiler means *all* builds benefit, which is the reason this was done on the other options. People build their local projects, newer versions of tools from GitHub, etc etc. This needs to be in the compiler directly. -- You received this bug notification because you are a member

[Bug 1972043] Re: Please add -ftrivial-auto-var-init=zero to default build flags

2022-05-07 Thread Kees Cook
Yes, -Wuninitialized continues to warn, even if they were auto- initialized. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972043 Title: Please add -ftrivial-auto-var-init=zero to default build fla

[Bug 1972043] [NEW] Please add -ftrivial-auto-var-init=zero to default build flags

2022-05-06 Thread Kees Cook
Public bug reported: Please add "-ftrivial-auto-var-init=zero" for GCC 12 (which is the first release of GCC to provide this flag). It goes well with the other important security flaw mitigation flags already enabled in Ubuntu for GCC: https://wiki.ubuntu.com/ToolChain/CompilerFlags While many

[Bug 1814012] Re: netplan type wifis needs a device option

2021-10-12 Thread Kees Cook
See https://github.com/canonical/netplan/pull/240 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1814012 Title: netplan type wifis needs a device option To manage notifications about this bug go to:

[Bug 1814012] Re: netplan type wifis needs a device option

2021-10-12 Thread Kees Cook
For example, fallback (-Dnl80211,wext) is used for the wpa_supplicant systemd service: https://salsa.debian.org/debian/wpa/-/blob/debian/unstable/debian/patches/networkd- driver-fallback.patch But it isn't present in the netplan networkd renderer. -- You received this bug notification because

[Bug 1814012] Re: netplan type wifis needs a device option

2021-10-12 Thread Kees Cook
> What is the range of possible values for this -D option, and why would you ever want to specify it in the netplan yaml instead of inferring it? It would be best if wpa_supplicant selected the correct driver, but it seems it doesn't do a good job with this. It does support fallbacks, though, whic

[Bug 1943049] Re: Docker ubuntu:impish: Problem executing scripts DPkg::Post-Invoke 'rm -f /var/cache/apt/archives/*.deb /var/cache/apt/archives/partial/*.deb /var/cache/apt/*.bin || true'

2021-09-09 Thread Kees Cook
Host dockers need this: https://github.com/moby/moby/pull/42681 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1943049 Title: Docker ubuntu:impish: Problem executing scripts DPkg::Post-Invoke 'rm -

[Bug 1943049] Re: Docker ubuntu:impish: Problem executing scripts DPkg::Post-Invoke 'rm -f /var/cache/apt/archives/*.deb /var/cache/apt/archives/partial/*.deb /var/cache/apt/*.bin || true'

2021-09-09 Thread Kees Cook
I hit this too. Host is hirsute. It went so far as blowing up docker itself, with: runtime/cgo: pthread_create failed: Operation not permitted -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/194304

[Bug 1360912] Re: ScanTool included on the repos does not connect

2021-07-13 Thread Kees Cook
Version 2.1 works with clones and presents a correct list of ports. Please open a new bug if problems persist. :) ** Changed in: scantool (Ubuntu) Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. h

[Bug 1914685] Re: Please enable CONFIG_UBSAN_BOUNDS

2021-02-04 Thread Kees Cook
This is a CONFIG request, do no apport collection required. :) ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed ** Also affects: linux (Ubuntu Groovy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hirsute) Importance: Undecided Status: C

[Bug 1914685] [NEW] Please enable CONFIG_UBSAN_BOUNDS

2021-02-04 Thread Kees Cook
Public bug reported: Enabling CONFIG_UBSAN_BOUNDS is fast and provides good coverage for out- of-bounds array indexing (i.e. it catchings the things that CONFIG_FORTIFY doesn't). ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification bec

[Bug 1912043] Re: grub2 fails to install/probe into md device when drives have moved around

2021-01-16 Thread Kees Cook
** Summary changed: - grub2 fails to install/probe into md device with first drive not active (i.e. hot spare) + grub2 fails to install/probe into md device when drives have moved around ** Description changed: grub2 appears to _sometimes_ ignore md devices with a hot spare: $ cat /proc/

[Bug 1912043] Re: grub2 fails to install/probe into md device with first drive not active (i.e. hot spare)

2021-01-16 Thread Kees Cook
Also need to fix the indexing. ** Patch added: "fix-md-array-enumeration.patch" https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1912043/+attachment/5453745/+files/fix-md-array-enumeration.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subsc

[Bug 1912043] Re: grub2 fails to install/probe into md device with first drive not active (i.e. hot spare)

2021-01-16 Thread Kees Cook
https://savannah.gnu.org/bugs/index.php?59887 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912043 Title: grub2 fails to install/probe into md device with first drive not active (i.e. hot spare)

[Bug 1912043] Re: grub2 fails to install/probe into md device with first drive not active (i.e. hot spare)

2021-01-16 Thread Kees Cook
** Patch added: "fix-md-array-list-truncation.patch" https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1912043/+attachment/5453655/+files/fix-md-array-list-truncation.patch ** Bug watch added: GNU Savannah Bug Tracker #59887 http://savannah.gnu.org/bugs/?59887 -- You received this bug

[Bug 1912043] Re: grub2 fails to install/probe into md device with first drive not active (i.e. hot spare)

2021-01-16 Thread Kees Cook
** Summary changed: - grub2 fails to install/probe into md device with hot spare + grub2 fails to install/probe into md device with first drive not active (i.e. hot spare) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.

[Bug 1912043] [NEW] grub2 fails to install/probe into md device with hot spare

2021-01-16 Thread Kees Cook
Public bug reported: grub2 appears to _sometimes_ ignore md devices with a hot spare: $ cat /proc/mdstat Personalities : [raid1] [linear] [multipath] [raid0] [raid6] [raid5] [raid4] [raid10] md5 : active raid1 sda2[2](S) sdb2[3] sde2[4] 2925939136 blocks super 1.2 [2/2] [UU] bitmap:

[Bug 1475337] Re: grub-probe can't probe large logical volumes (LVM)

2021-01-15 Thread Kees Cook
This particular problem appears fixed is latest grub2, though I'm seeing a similar failure, which may need a new bug report. ** Also affects: grub2 (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: grub2 (Ubuntu) Status: New => Fix Released ** Bug watch added: GN

[Bug 1027363] Re: grub-install fails with "out of disk" error

2021-01-15 Thread Kees Cook
*** This bug is a duplicate of bug 1475337 *** https://bugs.launchpad.net/bugs/1475337 ** This bug has been marked a duplicate of bug 1475337 grub-probe can't probe large logical volumes (LVM) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscrib

[Bug 1466150] Re: grub-install breaks when ESP is on raid

2020-11-29 Thread Kees Cook
(This may have only been present on older firmware versions, though, as I no longer see the behavior on a newer T30.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466150 Title: grub-install breaks

[Bug 1466150] Re: grub-install breaks when ESP is on raid

2020-11-29 Thread Kees Cook
https://outflux.net/blog/archives/2018/04/19/uefi-booting-and-raid1/ The UEFI on the Dell T30 I was testing on would write a "boot variable cache" file to the ESP. :( -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launch

[Bug 1466150] Re: grub-install breaks when ESP is on raid

2020-11-29 Thread Kees Cook
The only reference I could find was https://github.com/tianocore/tianocore.github.io/wiki/UEFI-Variable- Runtime-Cache which hints at a "device storage" for variables... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.laun

[Bug 1905975] Re: kernel: Enable CONFIG_BPF_LSM on Ubuntu

2020-11-27 Thread Kees Cook
(This is a feature request, so no log needed.) ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed ** Also affects: linux (Ubuntu Hirsute) Importance: Undecided Status: Confirmed ** Also affects: linux (Ubuntu Groovy) Importance: Undecided Status: New ** Cha

[Bug 1892526] Re: dpkg-reconfigure grub-pc no longer prompts for grub-pc/install_devices

2020-11-04 Thread Kees Cook
I can confirm this fixes the issue on Bionic on amd64. Thanks for the SRU! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892526 Title: dpkg-reconfigure grub-pc no longer prompts for grub-pc/install

[Bug 386558]

2020-07-28 Thread Kees Cook
commit a0f33f996f7986dbf37631a4577f8565b42df29e Author: Ulrich Drepper Date: Thu Sep 8 19:48:47 2011 -0400 Add range checking for FD_SET, FD_CLR, and FD_ISSET -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchp

[Bug 1880250] [NEW] disk check progress no longer visible

2020-05-22 Thread Kees Cook
Public bug reported: It seems the transition to bgrt lost something with Ubuntu's disk check details. The only thing I see on my screen during a long disk check is the "press Ctrl-C to stop all in progress disk checks" with no progress. ** Affects: plymouth (Ubuntu) Importance: Undecided

[Bug 1773859] Re: upgrades to 18.04 fail

2019-09-30 Thread Kees Cook
Hmm, I don't have any systems left with systemd-shim installed, so I can't do a "real world" test of this. The test case is the description seems reasonable, so if that passes, I would consider this bug fixed. :) Thanks! -- You received this bug notification because you are a member of Ubuntu Bug

[Bug 1767172] Re: Regression: /etc/modules checked against blacklist or it's really hard to load blacklisted watchdog modules when one really wants one

2019-05-20 Thread Kees Cook
I think it's fine. It sounds like there will just be no way to override package-installed blacklists any more. That's unfortunate, but it's a very rare situation. ** Changed in: systemd (Ubuntu) Status: Incomplete => Won't Fix ** Changed in: linux (Ubuntu) Status: Incomplete => Inva

[Bug 305901]

2019-02-22 Thread Kees Cook
So I'd like to bring this back up and reiterate the issue: there is no benefit to the early truncation, and it actively breaks lots of existing software (which is why Debian and Ubuntu have had this fix for 10 years now). What is the _benefit_ of early truncation that justifies breaking so many ex

[Bug 305901]

2019-02-22 Thread Kees Cook
It's not defined in POSIX, but it has worked a certain way in glibc for decades. There's no _reason_ to break it for _FORTIFY_SOURCE. Pre- truncating just silently breaks programs and does weird stuff. If you want to expose it with _FORITFY_SOURCE then have vsprintf notice that the target and first

[Bug 305901]

2019-02-22 Thread Kees Cook
I'd still like to have this patch applied -- while we can claim the behavior is "undefined", it is not, in fact, undefined. It behaves one way without -D_FORTIFY_SOURCE=2, and differently with it. And that difference doesn't need to exist. Ubuntu carried this patch for quite a while. -- You recei

[Bug 1640208] Re: Confusion between "scantool" and "freediag

2019-01-13 Thread Kees Cook
I have no idea how that connection happened. Seems like something automatic in Launchpad? I've dropped the linkage on the scantool side now. Weird! ** Changed in: scantool (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, w

[Bug 1771650] Re: openvpn startup script isn't working in ubuntu 18.04

2018-11-27 Thread Kees Cook
It shouldn't be necessary to do explicit "enable" calls to make this work. The generator _should_ be finding all the .conf files automatically: /lib/systemd/system-generators/openvpn-generator However, it is NOT working for me... -- You received this bug notification because you are a member of

[Bug 1783651] Re: Please enable CONFIG_PAGE_POISONING

2018-07-25 Thread Kees Cook
Oh no, leave CONFIG_PAGE_POISONING_NO_SANITY=y. Things get REALLY slow without that, and the default kernel is built with hibernation, so I would expect to do =y for that option. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://

[Bug 1783651] Re: Please enable CONFIG_PAGE_POISONING

2018-07-25 Thread Kees Cook
To clarify, I'm suggesting: CONFIG_PAGE_POISONING=y CONFIG_PAGE_POISONING_ZERO=y CONFIG_PAGE_POISONING_NO_SANITY=y this should have no impact on regular boots, and if someone boots with "page_poison=1" then they get page wiping when page_alloc pages are freed (and then GFP_ZERO is a no-op since i

[Bug 1783651] [NEW] Please enable CONFIG_PAGE_POISONING

2018-07-25 Thread Kees Cook
Public bug reported: I'd like to be able to use page poisoning, but CONFIG_PAGE_POISONING is not enabled on Ubuntu. (This option itself has a near-zero performance impact since it must be combined with the boot option "page_poison=1" to actually enable the poisoning.) To make the poisoning (when

[Bug 1773859] Re: upgrades to 18.04 fail

2018-06-12 Thread Kees Cook
# dpkg -L systemd-shim /. /usr /usr/lib /usr/lib/i386-linux-gnu /usr/lib/i386-linux-gnu/systemd-shim /usr/lib/i386-linux-gnu/systemd-shim-cgroup-release-agent /usr/lib/systemd /usr/lib/systemd/ntp-units.d /usr/lib/systemd/ntp-units.d/systemd-shim.list /usr/share /usr/share/dbus-1 /usr/share/dbus-1/

[Bug 1773859] Re: upgrades to 18.04 fail

2018-06-12 Thread Kees Cook
# cat /usr/share/dbus-1/system-services/org.freedesktop.systemd1.service [D-BUS Service] Name=org.freedesktop.systemd1 User=root Exec=/usr/lib/x86_64-linux-gnu/systemd-shim -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.l

[Bug 1593924] Re: systemd-shim was not installed in 16.10 and now cannot purge or remove

2018-05-28 Thread Kees Cook
** Package changed: libjpeg-turbo (Ubuntu) => systemd-shim (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1593924 Title: systemd-shim was not installed in 16.10 and now cannot purge or remov

[Bug 1773859] [NEW] upgrades to 18.04 fail

2018-05-28 Thread Kees Cook
Public bug reported: $ sudo apt upgrade Reading package lists... Done Building dependency tree Reading state information... Done Calculating upgrade... Done The following packages will be REMOVED: systemd-shim 0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 1 not fully installed o

[Bug 1766052] Re: Incorrect blacklist of bcm2835_wdt

2018-05-09 Thread Kees Cook
ping... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1766052 Title: Incorrect blacklist of bcm2835_wdt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux

[Bug 1767172] Re: Regression: /etc/modules checked against blacklist

2018-04-26 Thread Kees Cook
https://github.com/systemd/systemd/pull/8830 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1767172 Title: Regression: /etc/modules checked against blacklist To manage notifications about this bug g

[Bug 1767172] [NEW] Regression: /etc/modules checked against blacklist

2018-04-26 Thread Kees Cook
Public bug reported: Before systemd-modules-load, /etc/init.d/kmod would load modules directly with "modprobe" (and _not_ "modprobe -b"): load_module() { local module args module="$1" args="$2" if [ "$VERBOSE" != no ]; then log_action_msg "Loading kernel module $module" modprobe

[Bug 1766052] Re: Incorrect blacklist of bcm2835_wdt

2018-04-26 Thread Kees Cook
Oops, I missed the "|" ... fixed here: https://lists.ubuntu.com/archives/kernel-team/2018-April/092002.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1766052 Title: Incorrect blacklist of bcm28

[Bug 1759369] Re: kernel build fails on arm64

2018-04-24 Thread Kees Cook
** Also affects: gcc-7 (Ubuntu Bionic) Importance: Undecided Status: Fix Released ** Also affects: gcc-7-cross (Ubuntu Bionic) Importance: High Status: Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. h

[Bug 1766052] Re: Incorrect blacklist of bcm2835_wdt

2018-04-21 Thread Kees Cook
This should fix it: https://lists.ubuntu.com/archives/kernel-team/2018-April/091890.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1766052 Title: Incorrect blacklist of bcm2835_wdt To manage n

[Bug 1766052] [NEW] Incorrect blacklist of bcm2835_wdt

2018-04-21 Thread Kees Cook
Public bug reported: Without bcm2835_wdt loaded, Raspberry Pi systems cannot reboot or shut down. This needs to be removed from the automatic blacklist generated by the kernel build that ends up in /lib/modprobe.d/blacklist_linux_$(uname -r).conf ** Affects: linux (Ubuntu) Importance: Undeci

[Bug 1765484] Re: grub-install should handle /boot/efi on RAID1

2018-04-19 Thread Kees Cook
The error, specifically, is: Installing for x86_64-efi platform. efibootmgr: option requires an argument -- 'd' ... grub-install: error: efibootmgr failed to register the boot entry: Operation not permitted. Failed: grub-install --target=x86_64-efi WARNING: Bootloader is not properly installed

[Bug 1765484] [NEW] grub-install should handle /boot/efi on RAID1

2018-04-19 Thread Kees Cook
Public bug reported: I am using grub-efi. I have /boot/efi as a RAID1 with metadata=1.0 at the _end_ of the partition so it can still be seen by UEFI boot firmware as a FAT32 filesystem. grub-install calls efibootmgr with and empty -d argument: efibootmgr -c -d "" ... since it can't figure out w

[Bug 1750465] Re: package plymouth-theme-ubuntu-text 0.9.2-3ubuntu17 failed to install/upgrade: dependency problems - leaving triggers unprocessed

2018-03-04 Thread Kees Cook
I hit this too (on arm64). ** Attachment added: "apt-term.log" https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1750465/+attachment/5069501/+files/apt-term.log ** Changed in: plymouth (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you ar

[Bug 1747711] Re: file mis-identifies modern executables as application/x-sharedlib

2018-02-17 Thread Kees Cook
This is (sort of) a bug in file. The problem is not being able to distinguish between shared objects and PIE binaries. (The latter have INTERP ELF sections and can be run directly.) $ readelf -l /bin/true ... Elf file type is EXEC (Executable file) ... INTERP 0x0238 0x000

[Bug 1659801] Re: apparmor rules block ejabberdctl

2017-04-22 Thread Kees Cook
** Bug watch added: Debian Bug tracker #860951 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860951 ** Also affects: ejabberd (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860951 Importance: Unknown Status: Unknown -- You received this bug notification because

[Bug 1659801] Re: apparmor rules block ejabberdctl

2017-04-22 Thread Kees Cook
Add "m" to /etc/apparmor.d/usr.sbin.ejabberdctl's "su" subprofile on /bin/su line: /bin/su rm, -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1659801 Ti

[Bug 1580323] Re: Pull/merge 2016.05~rc3+dfsg1-1 from Debian experimental

2017-04-17 Thread Kees Cook
Bump. Please get this merged from Debian unstable. I'd like an arm64 rpi3 :) ** Also affects: u-boot (Ubuntu Zesty) Importance: Undecided Status: Confirmed ** Also affects: u-boot (Ubuntu Aa-series) Importance: Undecided Status: New -- You received this bug notification beca

[Bug 1680315] [NEW] Disable CONFIG_SECURITY_SELINUX_DISABLE

2017-04-05 Thread Kees Cook
Public bug reported: In the v4.12 kernel, CONFIG_SECURITY_SELINUX_DISABLE (which allows disabling selinux after boot) will conflict with read-only LSM structures. Since Ubuntu is primarily using AppArmor for its LSM, and SELinux is disabled by default, it makes sense to drop this feature in favor

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-27 Thread Kees Cook
... why aren't all the kernels just signed? Why does this need to be a separate package at all? I can confirm installing the -signed package fixes it for me. Where in the kernel source does this signature effect the output of /proc/sys/kernel/secure_boot, though? I can't find that... -- You rece

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-26 Thread Kees Cook
the proc handler does: secure_boot_enabled = efi_enabled(EFI_SECURE_BOOT); this feature flag is set at boot: #ifdef CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE if (boot_params.secure_boot == EFI_SECURE_BOOT) { set_bit(EFI_SECURE_BOOT, &efi.flags); enforce_sign

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-26 Thread Kees Cook
And that must be doing something wrong, since: sudo efivar -p -n $(efivar --list | grep SecureBoot) shows "1" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1658255 Title: Kernel not enforcing modu

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-26 Thread Kees Cook
And it looks like this is specific to the 4.8 kernel. 4.4 thinks secure boot is enabled. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1658255 Title: Kernel not enforcing module signatures under Sec

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-26 Thread Kees Cook
Oh, and that's not set up by the bootloader, it's in arch/x86/boot/compressed/eboot.c: boot_params->secure_boot = get_secure_boot(); -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1658255 Titl

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-26 Thread Kees Cook
(Hm, dmesg WARN on IOMMU seems to think I need 910170442944e1f8674fd5ddbeeb8ccd1877ea98, but that's unrelated...) ** Attachment added: "dmesg.txt" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1658255/+attachment/4809482/+files/dmesg.txt -- You received this bug notification because

[Bug 1658233] Re: missing apparmor rules

2017-01-26 Thread Kees Cook
I added this to the base profile, since other processes tripped over that one. (It's in a separate bug report) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1658233 Title: missing apparmor rules To

[Bug 1658255] Re: Kernel not enforcing module signatures under SecureBoot

2017-01-24 Thread Kees Cook
$ cat /proc/sys/kernel/secure_boot 0 That seems weird. Everything else thinks it's enabled. What sets this one (and what does it represent)? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1658255 Titl

[Bug 1639180] Re: no login possible after update to nvidia 304.132

2017-01-22 Thread Kees Cook
Is this fixed in Xenial? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1639180 Title: no login possible after update to nvidia 304.132 To manage notifications about this bug go to: https://bugs.lau

[Bug 1658255] [NEW] Kernel not enforcing module signatures under SecureBoot

2017-01-20 Thread Kees Cook
Public bug reported: $ sudo mokutil --sbstate SecureBoot enabled $ cat /proc/sys/kernel/moksbstate_disabled 0 $ sudo insmod ./hello.ko $ echo $? 0 $ dmesg | grep Hello [00112.530866] Hello, world! $ strings /lib/modules/$(uname -r)/kernel/lib/test_module.ko | grep signature ~Module signature appen

[Bug 1658236] Re: php abstraction not updated for php7

2017-01-20 Thread Kees Cook
This creates an upgrade burden on anyone already including the php5 abstraction. I think there should be a single abstraction (named php) but a symlink back to php5 that includes 5 and current... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1658239] [NEW] base abstraction missing glibc /proc/$pid/ things

2017-01-20 Thread Kees Cook
Public bug reported: There are yet more glibc-needed files missing from the base abstraction: --- base2017-01-20 15:37:50.0 -0800 +++ /etc/apparmor.d/abstractions/base 2016-12-06 14:13:58.0 -0800 @@ -92,7 +92,7 @@ /sys/devices/system/cpu/online r, # glibc's *print

[Bug 1658238] [NEW] apache2 abstraction incomplete

2017-01-20 Thread Kees Cook
Public bug reported: Apache2 needs updates for proper signal handling, optional saslauth, and OCSP stapling... --- apache2-common 2014-06-24 11:06:06.0 -0700 +++ /etc/apparmor.d/abstractions/apache2-common 2015-05-21 07:51:49.0 -0700 @@ -8,6 +8,8 @@ signal (receive) peer

[Bug 1658236] [NEW] php abstraction not updated for php7

2017-01-20 Thread Kees Cook
Public bug reported: The php abstraction (also wrongly named php5 now) was not updated for php7. Attached is a diff I used... ** Affects: apparmor (Ubuntu) Importance: Undecided Status: New ** Patch added: "php.diff" https://bugs.launchpad.net/bugs/1658236/+attachment/4806929/+f

[Bug 1658233] [NEW] missing apparmor rules

2017-01-20 Thread Kees Cook
Public bug reported: Missing from apparmor rules: /sys/devices/system/node/ r, /sys/devices/system/node/** r, ** Affects: mysql-5.7 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1645501] Re: corefiles not created in armhf chroot on arm64 porter

2016-11-29 Thread Kees Cook
ptrace(PTRACE_GETREGSET, 27642, NT_FPREGSET, 0xffcc67f0) = -1 EINVAL (Invalid argument) NT_FPREGSET is "2", which the kernel calls NT_PRFPREG. arm64 kernels don't implement this for compat processes, they only support NT_ARM_VFP. If I understand correctly, VFP is hard float, so it seems like this

[Bug 1639215] Re: After upgrade of Nvidia 304 drivers, mythfrontend.real crashed with SIGSEGV in QGLFormat::openGLVersionFlags()

2016-11-28 Thread Kees Cook
** Changed in: nvidia-graphics-drivers-304 (Ubuntu) Status: New => Confirmed ** Changed in: nvidia-graphics-drivers-304 (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.laun

[Bug 1639215] Re: After upgrade of Nvidia 304 drivers, mythfrontend.real crashed with SIGSEGV in QGLFormat::openGLVersionFlags()

2016-11-20 Thread Kees Cook
** Also affects: nvidia-graphics-drivers-304 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1639215 Title: After upgrade of Nvidia 304 drivers, my

[Bug 1385391] Re: Carrizo : IOMMU v2.6 feature support

2016-11-03 Thread Kees Cook
What is needed to support this IOMMU? Kernel CONFIGs? New code? Can you describe what is missing? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1385391 Title: Carrizo : IOMMU v2.6 feature support T

[Bug 1612790] [NEW] Provide kernel.perf_event_paranoid sysctl level 3

2016-08-12 Thread Kees Cook
Public bug reported: The perf subsystem provides a rather large attack surface, and system owners would like a way to disable access to non-root users. This is already being done in Android and Debian, and I'd like to do the same on my Ubuntu systems. :) https://lkml.org/lkml/2016/1/11/587 ** Af

[Bug 1436940] Re: Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041] is not supported

2016-07-25 Thread Kees Cook
Yup, but I wanted to avoid getting overwritten each time linux-firmware gets updated. ;) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1436940 Title: Qualcomm Atheros QCA6164 802.11ac Wireless Netwo

[Bug 1436940] Re: Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041] is not supported

2016-07-18 Thread Kees Cook
Adding ath10k/QCA6174/hw2.1/board-pci-168c:0041:17aa:3545.bin (from the working board.bin in this thread) seems to fix it, though: e6adc90ecaf55edc656990c6c50193ac board-pci-168c:0041:17aa:3545.bin -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribe

[Bug 1436940] Re: Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041] is not supported

2016-07-18 Thread Kees Cook
Hm, not fixed for me. still seeing firmware crashes. :( ** Changed in: linux-firmware (Ubuntu Xenial) Status: Fix Released => Confirmed ** Changed in: linux-firmware (Ubuntu) Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Ubunt

[Bug 1586673] Re: Backport GCC 5.4.0 and binutils 2.26.1 to 16.04 LTS

2016-07-12 Thread Kees Cook
I'm able to use these (and I can verify they fix the problems I was having), so +1 to promotion to -updates. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1586673 Title: Backport GCC 5.4.0 a

[Bug 1593462] [NEW] purge-old-kernels doesn't handle -lts kernels

2016-06-16 Thread Kees Cook
Public bug reported: When running an LTS kernel, purge-old-kernels should not remove the latest non-LTS kernel (and its metapackage). For example: $ dpkg -l 'linux-image-generic*' | grep ^.i ii linux-image-generic3.13.0.88.94 amd64Generic Linux kernel image ii linux-i

[Bug 1592628] Re: html entities are incorrectly preprocessed

2016-06-14 Thread Kees Cook
Nevermind, it's not html5lib, it's libpython3.5-stdlib, and the issue is the new undocumented "convert_charrefs" argument to _init__. ** Package changed: html5lib (Ubuntu) => python3.5 (Ubuntu) ** Summary changed: - html entities are incorrectly preprocessed + HTMLParser html entities preprocess

[Bug 1592628] [NEW] HTMLParser html entities preprocessing is undocumented

2016-06-14 Thread Kees Cook
Public bug reported: The attached script does not emit HTML entities on Xenial, but works correctly on Trusty. I don't see any difference in the html2lib package, so I assume something must have changed in Python 3. Trusty (correct): $ ./test.py Start tag: body Named ent: uuml End tag : body X

[Bug 1573848] [NEW] KASLR should be enabled by default (x86)

2016-04-22 Thread Kees Cook
Public bug reported: Kernel Address Space Layout Randomization (KASLR) can make it harder to accomplish kernel security vulnerability exploits, especially during remote attacks or attacks from containers. On x86, KASLR has a run-time conflict with Hibernation, and currently the kernel selects Hibe

[Bug 1416039] Re: Broken apparmor profile

2016-03-09 Thread Kees Cook
This is needed for trusty too, it seems. ** Also affects: squid3 (Ubuntu Trusty) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1416039 Title: Broken appa

[Bug 1551894] Re: linux: 4.4.0-9.X fails yama ptrace restrictions tests

2016-03-01 Thread Kees Cook
Please also backport 3dfb7d8cdbc7ea0c2970450e60818bb3eefbad69 from 4.5-rc1. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1551894 Title: linux: 4.4.0-9.X fails yama ptrace restrictions tests To ma

[Bug 1534340] Re: openssh server 6.6 does not report max auth failures

2016-01-14 Thread Kees Cook
** Changed in: openssh (Ubuntu Trusty) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1534340 Title: openssh server 6.6 does not report max auth failures To manage

[Bug 1534340] [NEW] openssh server 6.6 does not report max auth failures

2016-01-14 Thread Kees Cook
ty) Importance: Undecided Assignee: Kees Cook (kees) Status: New ** Also affects: openssh (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: openssh (Ubuntu) Status: New => Fix Released ** Changed in: openssh (Ubuntu Trusty) Assignee

[Bug 1534340] Re: openssh server 6.6 does not report max auth failures

2016-01-14 Thread Kees Cook
** Patch added: "openssh_6.6p1-2ubuntu2.5.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1534340/+attachment/4550125/+files/openssh_6.6p1-2ubuntu2.5.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://b

[Bug 1532911] Re: [regression] 2.12.23-12ubuntu2.4 breaks sha512 certificates

2016-01-11 Thread Kees Cook
Thanks to mdeslaur for finding that the _root_ cert is the problem, not mine, nor a code problem with gnutls: http://blog.cacert.org/2015/12/re-signing-root-certificate/ ** Changed in: gnutls26 (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member

[Bug 1532911] [NEW] [regression] 2.12.23-12ubuntu2.4 breaks sha512 certificates

2016-01-11 Thread Kees Cook
Public bug reported: $ gnutls-cli -p 587 smtp.outflux.net -s --print-cert STARTTLS ctrl-D *** Starting TLS handshake *** Fatal error: The signature algorithm is not supported. *** Handshake has failed This does not happen with 2.12.23-12ubuntu2.3. $ echo QUIT | openssl s_client -connect smtp.out

[Bug 1448912] Re: BUG: unable to handle kernel NULL pointer dereference (aa_label_merge)

2015-12-05 Thread Kees Cook
Still no issues for me. Yay! :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1448912 Title: BUG: unable to handle kernel NULL pointer dereference (aa_label_merge) To manage notifications about thi

[Bug 1448912] Re: BUG: unable to handle kernel NULL pointer dereference (aa_label_merge)

2015-11-17 Thread Kees Cook
It's been 3 days running the test kernel and I've seen no problems. Very encouraging! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1448912 Title: BUG: unable to handle kernel NULL pointer dereferen

[Bug 1436940] Re: Atheros wifi 168c:0041(QCA6174) is not supported

2015-09-08 Thread Kees Cook
** Attachment removed: "firmware for qca6174" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1436940/+attachment/4450449/+files/ath10k-qca6174.tar.bz2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net

[Bug 1436940] Re: Atheros wifi 168c:0041(QCA6174) is not supported

2015-09-07 Thread Kees Cook
** Summary changed: - Atheros wifi 168c:0041(QCA6164) is not supported + Atheros wifi 168c:0041(QCA6174) is not supported -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1436940 Title: Atheros wifi 1

[Bug 1436940] Re: Atheros wifi 168c:0041(QCA6164) is not supported

2015-08-21 Thread Kees Cook
I have not tested these, but IIUC, this is where to get an upstream kernel build, configured for Ubuntu, thought likely without Ubuntu- specific patches: http://kernel.ubuntu.com/~kernel- ppa/mainline/daily/current/ -- You received this bug notification because you are a member of Ubuntu Bugs, wh

[Bug 1436940] Re: Atheros wifi 168c:0041(QCA6164) is not supported

2015-08-21 Thread Kees Cook
@jsalisbury is there a 4.2 ubuntu kernel we could test with? Here's a tarball with the firmware files. It's unpacked as: cd /lib/firmware tar xf /tmp/ath10k-qca6174.tar.bz2 ** Attachment added: "firmware for qca6174" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1436940/+attachment/44

  1   2   3   4   5   6   7   8   9   10   >