[Bug 1920685] Re: Shity ubujntu 20.04 upgrade

2021-03-30 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1921545] Re: While installing Lubuntu 18.04.5-desktop-amd64 , the grub failed to install therefore causing installation to crash.

2021-03-30 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1921485] Re: Bosch CERT Advisory: OpenSSL Multiple Vulnerabilities

2021-03-30 Thread Steve Beattie
This was addressed in https://ubuntu.com/security/notices/USN-4891-1 . ** Information type changed from Private Security to Public Security ** Changed in: openssl (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1921578] Re: package phpmyadmin 4:4.9.5+dfsg1-2 failed to install/upgrade: el subproceso instalado paquete phpmyadmin script post-installation devolvió el código de salida de error 1

2021-03-30 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1921585] Re: Screen contents visible when switching between logged in users using CTrl + Alt + Fx

2021-03-30 Thread Steve Beattie
Hey Milfred, sorry you are hitting this issue. What Ubuntu release is this? And can you confirm that the desktop envirnment you're using is the Ubuntu desktop, and not something else? Thanks. ** Package changed: ubuntu => gdm3 (Ubuntu) ** Information type changed from Private Security to

[Bug 1799386] Re: Screen not locked when coming out of suspend/hibernate

2021-03-30 Thread Steve Beattie
*** This bug is a duplicate of bug 1532508 *** https://bugs.launchpad.net/bugs/1532508 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1921617] Re: installation crashed in the middle

2021-03-30 Thread Steve Beattie
Relevat bits from UbiquitySyslog Mar 28 10:33:20 ubuntu grub-installer: info: Installing grub on '/dev/sdb' Mar 28 10:33:20 ubuntu grub-installer: info: grub-install does not support --no-floppy Mar 28 10:33:20 ubuntu grub-installer: info: Running chroot /target grub-install --force

[Bug 1921617] Re: installation crashed in the middle

2021-03-30 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1921690] Re: I dont know

2021-03-30 Thread Steve Beattie
Thank you for using Ubuntu and taking the time to report a bug. Your report should contain, at a minimum, the following information so we can better find the source of the bug and work to resolve it. Submitting the bug about the proper source package is essential. For help see

[Bug 1921941] Re: samba install flushes iptables and sets all chains to policy accept

2021-03-30 Thread Steve Beattie
Hello, sorry you are having this issue. Unfortunately I am unable to reporduce this, with samba 2:4.11.6+dfsg- 0ubuntu1.6 from focal, either by applying iptables rules manually or enabling firewall rules with ufw: $ sudo iptables -D INPUT -i lo -j LOG $ sudo iptables -L INPUT -n Chain

[Bug 1921941] Re: samba install flushes iptables and sets all chains to policy accept

2021-03-30 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921941 Title: samba install flushes iptables and sets all chains to policy accept

[Bug 388605] Re: [MIR] rsyslog

2021-03-30 Thread Steve Beattie
Ack by the Ubuntu Security team to move rsyslog-gnutls to main, both for hirsute, and for bionic, focal, and groovy. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/388605 Title: [MIR]

[Bug 1919285] Re: Nvidia

2021-03-16 Thread Steve Beattie
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1919285 Title: Nvidia To manage notifications about this bug go to:

[Bug 1912708] Re: CONFIG_RANDOMIZE_BASE on ppc64el

2021-03-11 Thread Steve Beattie
Thanks for pointing that out, Krzysztof. Seth, the reason that I limited the bug report to ppc64 is that Ubuntu 16.04 LTS with its 4.4 based kernel was the last release we supported 32bit powerpc platforms. -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1915009] Re: [MIR] libmd (dependency of libbsd)

2021-03-09 Thread Steve Beattie
I reviewed libmd 1.0.3-3build1 as checked into hirsute. This shouldn't be considered a full audit but rather a quick gauge of maintainability. libmd is a small library of message digest aka hash functions. - No CVE history. - No non-essential build-depends. - No pre/post inst/rm scripts, only a

[Bug 1867198] Re: MIR: bin:libnginx-mod-http-geoip2 from src:nginx

2021-03-06 Thread Steve Beattie
I reviewed libnginx-mod-http-geoip2/nginx 1.18.0-6ubuntu4 (aka http-geoip2 3.3 upstream) as checked into hirsute. This shouldn't be considered a full audit but rather a quick gauge of maintainability. libnginx-mod-http-geoip2 is an nginx module registers variables on the connection based on the

[Bug 1917509] Re: Call for testing: grub2 security updates

2021-03-06 Thread Steve Beattie
I have successfully tested these grub2 updates on groovy, focal, bionic, and xenial bare metal machines with efi + secure boot, as well as a bionic efi system with secure boot disabled. All worked and things like grub menus continued to work. On trusty/esm with the grub packages from

[Bug 1917529] Re: grub2-efi-amd64-signed 1.164+2.04-1ubuntu42 fails to display boot menu on 14.04 ESM

2021-03-02 Thread Steve Beattie
Attaching the generated /boot/grub/grub.cfg ** Attachment added: "trusty-ESM-grub.cfg" https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/1917529/+attachment/5472023/+files/trusty-ESM-grub.cfg -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1917529] Re: grub2-efi-amd64-signed 1.164+2.04-1ubuntu42 fails to display boot menu on 14.04 ESM

2021-03-02 Thread Steve Beattie
(same grub.cfg is generated with either sets of grub packages installed) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917529 Title: grub2-efi-amd64-signed 1.164+2.04-1ubuntu42 fails to display

[Bug 1917529] [NEW] grub2-efi-amd64-signed 1.164+2.04-1ubuntu42 fails to display boot menu on 14.04 ESM

2021-03-02 Thread Steve Beattie
Public bug reported: Attempting to boot under secure boot/uefi on trusty ESM with the following packages installed: $ dpkg -l 'grub*' | grep ^ii ii grub-common2.02~beta2-9ubuntu1.22 amd64GRand Unified Bootloader (common files) ii grub-efi-amd64 2.04-1ubuntu42

[Bug 1917509] [NEW] Call for testing: grub2 security updates

2021-03-02 Thread Steve Beattie
Public bug reported: Several security issues were announced on 2021-03-02, see https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021 for details. As part of this update, a large number of changes were incorporated, both in grub2 and how it is packaged. Updates will

[Bug 1916893] Re: Regression - upate python2.7 for cover CVE-2021-3177 modifying unicode parts cause serious regressions

2021-02-25 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1916893 Title: Regression - upate python2.7 for cover CVE-2021-3177 modifying

[Bug 1899573] Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9

2021-02-22 Thread Steve Beattie
Oh, this was fixed in https://usn.ubuntu.com/usn/usn-4657-1, https://usn.ubuntu.com/usn/usn-4658-1, https://usn.ubuntu.com/usn/usn-4659-1, and https://usn.ubuntu.com/usn/usn-4660-1 . Marking fix released. Thanks. ** Information type changed from Private Security to Public Security ** Changed

[Bug 1908502] Re: [MIR] libdeflate

2021-02-22 Thread Steve Beattie
I reviewed libdeflate 1.7-1 as checked into hirsute. This shouldn't be considered a full audit but rather a quick gauge of maintainability. libdeflate is a compression/decompression library for the Deflate compression algorithm, along with associated command line tools. It is written in C and

[Bug 1226911] Re: [feature] update microcode to 20130906 version

2021-02-11 Thread Steve Beattie
Precise has intel-microcode 0.20140624-p-1ubuntu1, closing that task. ** Changed in: intel-microcode (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1901240] Re: Ubuntu GNOME Path Traversal

2021-02-09 Thread Steve Beattie
Upstream issue: https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7 and associated fix https://gitlab.gnome.org/GNOME/gnome- autoar/-/commit/adb067e645732fdbe7103516e506d09eb6a54429 Given that this is public upstream, I'm going to open this issue ap as well. ** Bug watch added:

[Bug 1904615] Re: cpio symlink traversal

2021-02-09 Thread Steve Beattie
Hello Yiğit, Sorry for the delay in responding to this issue. This issue was originally identified as CVE-2015-1197 and fixed around the same time frame. It was addressed in upstream cpio commit https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=45b0ee2b407913c533f7ded8d6f8cbeec16ff6ca in a

[Bug 1910518] Re: Mozilla Firefox / Firefox ESR Arbitrary Code Execution Vulnerability; ThreatCon 5

2021-02-09 Thread Steve Beattie
** Changed in: firefox (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910518 Title: Mozilla Firefox / Firefox ESR Arbitrary Code Execution Vulnerability;

[Bug 1863299] Re: linux-aws fails to late load microcode, works with generic

2021-02-09 Thread Steve Beattie
Hello Dimitri, The source of this is that the linux-aws (and some other cloud-specific) kernels do not have CONFIG_MICROCODE_OLD_INTERFACE enabled, while they are enabled in the generic kernel configs. For consideration, this is the kernel config documentation for this option: config

[Bug 1915205] Re: CVE-2020-9366

2021-02-09 Thread Steve Beattie
Hello Steve, Thanks for reporting this issue. In this case, it is believed that the vulnerability was introduced in screen 4.7.0 (via https://git.savannah.gnu.org/cgit/screen.git/commit/?id=c5db181b6e017cfccb8d7842ce140e59294d9f62 ), and then fixed in 4.8.0. Ubuntu 18.04 and older versions of

[Bug 1915205] Re: CVE-2020-9366

2021-02-09 Thread Steve Beattie
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-9366 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1915205 Title: CVE-2020-9366 To manage notifications about this bug go to:

[Bug 1904471] Re: Ubuntu-5.4.0-48.52 introduces a regression by cherry picking partial fixes from set of commits

2021-02-09 Thread Steve Beattie
Hi Shoily, Coming back around to this issue, it looks like b431ef837e3374da0db8ff6683170359aaa0859c landed in focal in 5.4.0-49.53 and bionic in 4.15.0-119.120. I'm making this public as well as marking it as fix released. Thanks again for the report! ** Information type changed from Private

[Bug 1909608] Re: networkmanager sets DNS server configuration without proper dns-search/dns-priority causing DNS requests leak to ISP (openconnect+split-tunnel+non-split DNS)

2021-02-09 Thread Steve Beattie
Hi Adam, Marking public given the public bug reports elsewhere. It looks like upstream addressed this in network-manager 1.28, which has not made it into Ubuntu yet. ** Information type changed from Private Security to Public Security ** Changed in: network-manager (Ubuntu) Status: New

[Bug 1909596] Re: Error on trying to change password

2021-02-09 Thread Steve Beattie
Hi, it seems that for some reason cracklib has failed to generate /var/cache/cracklib/cracklib_dict.pwd (or /var/cache/cracklib/cracklib_dict.pwd.gz). There is a daily cronjob that is supposed to regenerate /var/cache/cracklib/cracklib_dict.pwd if the dictionaries it used as input are newer. I'm

[Bug 1910220] Re: Characters from dead keys shown in plan view in password field on login screen

2021-02-09 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910220 Title: Characters from dead keys shown in plan view in password field on

[Bug 1910518] Re: Mozilla Firefox / Firefox ESR Arbitrary Code Execution Vulnerability; ThreatCon 5

2021-02-09 Thread Steve Beattie
Hello, Thanks for the report. This issue was addressed in https://ubuntu.com/security/notices/USN-4687-1 . ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-16044 ** Information type changed from Private Security to Public Security -- You received this bug notification because

[Bug 1910608] Re: openvswitch embedded code copy of lldpd is vulnerable to CVE-2015-8011

2021-02-09 Thread Steve Beattie
This issue was addressed in https://ubuntu.com/security/notices/USN-4691-1 . ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27827 ** Changed in: openvswitch (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu

[Bug 1910878] Re: Ubuntu 21.04 QA Testing Install entire disk with lvm & encryption

2021-02-09 Thread Steve Beattie
** Package changed: ubuntu => subiquity (Ubuntu) ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910878 Title: Ubuntu 21.04 QA Testing

[Bug 1912091] Re: Memory Leak GNU Tar 1.33

2021-02-09 Thread Steve Beattie
** Changed in: tar (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912091 Title: Memory Leak GNU Tar 1.33 To manage notifications about this bug go to:

[Bug 1912371] Re: [MIR] flashrom

2021-02-09 Thread Steve Beattie
** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912371 Title: [MIR] flashrom To manage notifications about this bug go to:

[Bug 1913976] Re: light-locker fails to lock screen

2021-02-09 Thread Steve Beattie
** Summary changed: - so broken is practically useless + light-locker fails to lock screen -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1913976 Title: light-locker fails to lock screen

[Bug 1914228] Re: the indicator light of the shift key works correctly but the change from upper case to lower case is not done correctly so I have to display my password to see if it is upper case or

2021-02-09 Thread Steve Beattie
** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1914228 Title: the indicator light of the shift key works correctly but the change

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-02-09 Thread Steve Beattie
Hi Dimitri, I don't know that all dkms SRUs need to go to the security pockets, but ones that fix build issues surely do, given the problems that a dkms build failure causes in package installs. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1914839] Re: package upgrade should replace /etc/ssl/certs/ca-certificates.crt atomically

2021-02-09 Thread Steve Beattie
Ah yes, /usr/sbin/update-ca-certificates is deleting the ca- certificates.crt shortly before atomically moving the new version into place. It looks like a fic was committed in debian for this a couple of weeks ago:

[Bug 1914863] Re: package linux-headers-4.4.0-145-generic 4.4.0-145.171 failed to install/upgrade: package linux-headers-4.4.0-145-generic is not ready for configuration cannot configure (current stat

2021-02-09 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1915079] Re: stava copiando i dati

2021-02-09 Thread Steve Beattie
Hi, possibly you are facing a corrupted image or a hardware problem, given: Feb 8 21:46:53 ubuntu kernel: [ 687.895337] SQUASHFS error: zlib decompression failed, data probably corrupt Feb 8 21:46:53 ubuntu kernel: [ 687.895345] SQUASHFS error: squashfs_read_data failed to read block

[Bug 1915127] Re: package linux-modules-extra-5.8.0-43-generic 5.8.0-43.49~20.04.1 failed to install/upgrade: unable to create new file '/var/lib/dpkg/info/linux-modules-extra-5.8.0-43-generic.list-ne

2021-02-09 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1915129] Re: Mozilla Firefox / Firefox ESR Buffer Overflow Vulnerability

2021-02-09 Thread Steve Beattie
Thanks for the report. From the advisory, this particular issue only affected Firefox on Windows, so this should be a non-issue on Ubuntu: "Note: This issue only affected Windows operating systems. Other operating systems are unaffected." ** Information type changed from Private Security to

[Bug 1914481] Re: use the size of the data when determing the server response

2021-02-04 Thread Steve Beattie
For fixing this via an SRU for focal and groovy, the Ubuntu Security team is okay with the result of this going to the security pocket, assuming the update is built in a ppa where only security updates are enabled. Thanks! -- You received this bug notification because you are a member of Ubuntu

[Bug 1913482] Re: Update tzdata to version 2021a

2021-01-31 Thread Steve Beattie
Hi Brian, thanks for preparing the debdiffs. I built, tested, and published the updated tzdata packages to the trusty/esm and precise/esm archives. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1913188] Re: linux-hwe 4.15.0-133.137~16.04.1 ADT test failure with linux-hwe ubuntu_qrt_kernel_panic

2021-01-28 Thread Steve Beattie
Hi, The particular test that is timing out actually is supposed to emit periodic output to stdout; it basically is running the test program from kernel commit b4a1b4f5047e4f54e194681125c74c0aa64d637d 10 times and attempts to emit a count every 1000 iterations, writing to and flushing stdout.

[Bug 1913392] Re: Security Repository Doesn't Contain USN-4689-4 Fixed Kernel Version

2021-01-28 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1913392 Title: Security Repository Doesn't Contain USN-4689-4 Fixed Kernel Version

[Bug 1912708] Re: CONFIG_RANDOMIZE_BASE on powerpc / ppc64el

2021-01-21 Thread Steve Beattie
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed ** Summary changed: - CONFIG_RANDOMIZE_BASE on powerpc / ppc64el + CONFIG_RANDOMIZE_BASE on ppc64el -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1904082] Re: apport's log collecting leaks MAC addresses maybe helping WiFi attacks?

2021-01-21 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1904082 Title: apport's log collecting leaks MAC addresses maybe helping WiFi

[Bug 1909486] Re: tiocspgrp()" Privilege Escalation Vulnerability

2021-01-20 Thread Steve Beattie
** Information type changed from Private Security to Public Security ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Changed in: linux (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1911211] Re: Please upgrade to openssl 1.1.1g or later for 20.04

2021-01-20 Thread Steve Beattie
** Changed in: openssl (Ubuntu) Status: New => Invalid ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911211 Title:

[Bug 1912230] Re: package mariadb-client-10.3 (not installed) failed to install/upgrade: trying to overwrite '/usr/bin/mysqldump', which is also in package mysql-community-client-core 8.0.22-1ubuntu20

2021-01-20 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1911869] Re: package virtualbox 6.1.10-dfsg-1~ubuntu1.20.04.1 failed to install/upgrade: проблемы зависимостей — оставляем не настроенным

2021-01-20 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1912252] Re: Kubuntu 21.04 QA TEST Overwrite empty disk space missing

2021-01-20 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1912122] Re: /var/log/dmesg is 0644, should be 0640 to match new DMESG_RESTRICT restrictions

2021-01-18 Thread Steve Beattie
Oh, I was expecting that it would also be desirable to SRU this back to focal, as I expected CONFIG_SECURITY_DMESG_RESTRICT to come back with the HWE kernels, but looking at the config for linux-hwe-5.8, it appears that the old behavior was kept. -- You received this bug notification because you

[Bug 1884887] Re: rsyslogd dmesg unit leaves /var/log/dmesg* world readable

2021-01-18 Thread Steve Beattie
*** This bug is a duplicate of bug 1912122 *** https://bugs.launchpad.net/bugs/1912122 ** This bug has been marked a duplicate of bug 1912122 /var/log/dmesg is 0644, should be 0640 to match new DMESG_RESTRICT restrictions -- You received this bug notification because you are a member of

[Bug 1912122] Re: /var/log/dmesg is 0644, should be 0640 to match new DMESG_RESTRICT restrictions

2021-01-18 Thread Steve Beattie
The Ubuntu Security team would like to see this fixed, though it probably would be worth adding the following change to the service file so that on log rotation the permissions are corrected as well: -ExecStartPre=-/usr/bin/savelog -q -p -n -c 5 /var/log/dmesg +ExecStartPre=-/usr/bin/savelog

[Bug 1910608] Re: openvswitch embedded code copy of lldpd is vulnerable to CVE-2015-8011

2021-01-15 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910608 Title: openvswitch embedded code copy of lldpd is vulnerable to

[Bug 1909698] Re: new upstream release 2020f

2021-01-11 Thread Steve Beattie
Hi Brian, Thanks for the trusty and precise debdiffs. I have gone ahead and published the updates to trusty-esm and precise-esm, after verifying the fixes. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1889248] Re: [MIR] mdevctl, jq, libonig

2021-01-04 Thread Steve Beattie
I reviewed jq 1.6-2.1 as checked into hirsute. This shouldn't be considered a full audit but rather a quick gauge of maintainability. jq is a flexible command-line JSON processor. It ends up implementing its own language for querying and manipulating JSON structures. As such, there are times

[Bug 1895298] Re: After tnstall the Ubuntu, I must disable the "Secure Boot " & " Fast Boot " in my sys motherboard. Why ?

2020-12-21 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1895298 Title: After tnstall the Ubuntu, I must disable the "Secure Boot " & "

[Bug 1872036] Re: grub-customizer assert failure: grub-customizer: ../../src/xcb_io.c:260: poll_for_event: Předpoklad „!xcb_xlib_threads_sequence_lost“ nesplněn.

2020-11-24 Thread Steve Beattie
** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1872036 Title: grub-customizer assert failure: grub-customizer: ../../src/xcb_io.c:260:

[Bug 1872831] Re: grub-customizer crashed with SIGSEGV in SettingsController::updateTimeoutSettingAction()

2020-11-24 Thread Steve Beattie
** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1872831 Title: grub-customizer crashed with SIGSEGV in

[Bug 1905401] Re: package grub-pc 2.04-1ubuntu26.7 failed to install/upgrade: installed grub-pc package post-installation script subprocess returned error exit status 127

2020-11-24 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1894980] Re: CVE-2020-16120: unprivileged overlayfs permission checking

2020-11-17 Thread Steve Beattie
** Changed in: linux (Ubuntu) Status: Confirmed => Fix Released ** Information type changed from Private Security to Public Security ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-16120 -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1901020] Re: new upstream release 2020d

2020-10-29 Thread Steve Beattie
After confirming the behavior around SystemV timezones and changed timezones, tzdata 2020d-0ubuntu0.12.04 and tzdata 2020d- 0ubuntu0.14.04+esm1 are now published in their respective ESM releases. Thanks for preparing the updates, Brian! ** Changed in: tzdata (Ubuntu Precise) Status: In

[Bug 1881447] Re: package ca-certificates 20180409 failed to install/upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 1

2020-10-28 Thread Steve Beattie
Hey Vern, Sorry you were having difficulties. 'sudo apt install -f' should cause apt to attempt to finish installing packages that had problems during the post install phase, where the error that is tripped over (like the dangling symlink in /etc/ssl/certs) has been resolved. ** Changed in:

[Bug 1901020] Re: new upstream release 2020d

2020-10-27 Thread Steve Beattie
Thanks Brian, these look good, will take these into Trusty and Precise ESM. (For the record, I noticed that the 2020d dropped the US/Pacific-New timezone, which was a symlink to the US/Pacific timezone. Testing demonstrated that a system with a configured Pacific-New timezone functioned correctly

[Bug 1901020] Re: new upstream release 2020d

2020-10-27 Thread Steve Beattie
** Changed in: tzdata (Ubuntu Precise) Status: New => In Progress ** Changed in: tzdata (Ubuntu Trusty) Status: New => In Progress ** Changed in: tzdata (Ubuntu Precise) Assignee: (unassigned) => Steve Beattie (sbeattie) ** Changed in: tzdata (Ubuntu Trusty)

[Bug 856489] Re: Improper verification of updated key via apt-key net-update

2020-10-24 Thread Steve Beattie
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-3374 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/856489 Title: Improper verification of updated key via apt-key net-update To

[Bug 1864666] Re: [MIR] python-octavia-lib, ovn-octavia-provider

2020-10-20 Thread Steve Beattie
I reviewed python-octavia-lib 2.2.0-0ubuntu1 as checked into groovy. This shouldn't be considered a full audit but rather a quick gauge of maintainability. python-octavia-lib is a python3 library for developers writing Octavia load balancer provider drivers. - No CVE history. - No concerning

[Bug 1889688] Re: [MIR] nvme-cli

2020-10-19 Thread Steve Beattie
I reviewed nvme-cli 1.12-1ubuntu1 as checked into groovy. This shouldn't be considered a full audit but rather a quick gauge of maintainability. nvme-cli is a set of command line tools for managing NVMe devices. - No history of CVEs. - No init scripts - Four systemd units, that are used to

[Bug 1899046] Re: /usr/bin/aa-notify:ModuleNotFoundError:/usr/bin/aa-notify@39

2020-10-08 Thread Steve Beattie
That is correct (apparmor-notify package needs an added dependency on python3-psutil). We have an upload in progress to address it. Thanks! ** Changed in: apparmor (Ubuntu) Status: New => In Progress ** Changed in: apparmor (Ubuntu) Importance: Undecided => High -- You received this

[Bug 1898742] Re: Linux Kernel "ppp_cp_parse_cr()" Denial of Service Vulnerability

2020-10-06 Thread Steve Beattie
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1898742 Title: Linux Kernel "ppp_cp_parse_cr()" Denial of Service

[Bug 1896246] Re: Vendor golang-* build dependencies

2020-10-01 Thread Steve Beattie
For the record, the Ubuntu Security team signs off on the plan to vendor the golang dependencies for the google-guest-agent and google-oslogin- agent packages as they go through the MIR process, for the reasons given above. Thanks! -- You received this bug notification because you are a member

[Bug 1887577] Re: DEP8: Invalid capability setuid

2020-09-21 Thread Steve Beattie
The fix for this is included in the apparmor 3.0.0~beta1-0ubuntu5 upload into groovy-proposed, which is waiting to migrate to groovy. ** Changed in: apparmor (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1385013] Re: proper fix for apparmor mediation of lower (encrypted) filesystem

2020-08-25 Thread Steve Beattie
** Changed in: apparmor (Ubuntu) Status: Fix Released => Confirmed ** Changed in: ecryptfs-utils (Ubuntu) Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1882093] Re: CVE-2020-{5963|5967} NVIDIA

2020-08-18 Thread Steve Beattie
Publication to focal-updates for nvidia-driver-440-server 440.95.01-0ubuntu0.20.04.1 and for groovy happened as well, closing tasks. ** Changed in: nvidia-graphics-drivers-440-server (Ubuntu Focal) Status: Fix Committed => Fix Released ** Changed in: nvidia-graphics-drivers-440-server

[Bug 1883793] Re: systemd-resolved leaks mDNS queries to DNS

2020-08-18 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883793 Title: systemd-resolved leaks mDNS queries to DNS To manage notifications

[Bug 1884265] Re: [fips] ntpq segfaults when attempting to use MD5 from FIPS-openssl library.

2020-08-18 Thread Steve Beattie
Closing ntp task for groovy. ** Changed in: ntp (Ubuntu) Status: New => Invalid ** Changed in: openssl (Ubuntu Bionic) Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1891361] Re: sshfs crashes entire Ubuntu 20.04.1 LTS system

2020-08-18 Thread Steve Beattie
** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1891361 Title: sshfs crashes entire Ubuntu 20.04.1 LTS system To manage

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-17 Thread Steve Beattie
This was addressed in bionic in https://launchpad.net/ubuntu/+source/ark/4:17.12.3-0ubuntu1.1 and focal in https://launchpad.net/ubuntu/+source/ark/4:19.12.3-0ubuntu1.1, and covered in USN 4461-1. Thanks for preparing the updates and helping to protect users, vishnunaini! ** Changed in: ark

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-17 Thread Steve Beattie
** Also affects: ark (Ubuntu Bionic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1889672 Title: KDE Project Security Advisory: Ark: maliciously crafted

[Bug 1890066] Re: package grub-pc-bin 2.04-1ubuntu26.2 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration

2020-08-11 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread Steve Beattie
vishnunaini, thanks for testing and the pointer to the reproducer. I also went ahead and carried back the patch to bionic's ark as well, and have uploaded it to the same ppa. For xenial, the patch fails to apply because the passed archive entry type is different, and it was not clear to me

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread Steve Beattie
Thanks for preparing the debdiff and adding the ubuntu-security-sponsors account; I'll be taking a look at this. I've pushed the focal version to the ubuntu security proposed ppa (https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa) after adjusting the version to match the

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread Steve Beattie
** Changed in: ark (Ubuntu Focal) Assignee: (unassigned) => Steve Beattie (sbeattie) -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to ark in Ubuntu. https://bugs.launchpad.net/bugs/1889672 Title: KDE Project Security Advisory:

[Bug 1887577] Re: DEP8: Invalid capability setuid

2020-07-27 Thread Steve Beattie
This is due to a change in behavior in make 4.3. It was addressed in the upstream merge request https://gitlab.com/apparmor/apparmor/-/merge_requests/461 and was cherrypicked into the apparmor 2.13 branch via merge request https://gitlab.com/apparmor/apparmor/-/merge_requests/465. -- You

[Bug 1888890] [NEW] openscap: xenial version is lower than version published in trusty/esm

2020-07-24 Thread Steve Beattie
Public bug reported: openscap 1.2.8 was backported to the trusty ESM product to support some of the improvements we are making to our generated OVAL data and consumption on that platform. Unfortunately, the version used in the trusty esm update is 1.2.8-1ubuntu02+esm1 which is greater than the

[Bug 1871538] Re: dbus timeout-ed during an upgrade, taking services down including gdm

2020-07-19 Thread Steve Beattie
I also hit this again in focal on 2020-06-25, with an update to systemd 245.4-4ubuntu3.1; I had previously updated dbus to 1.12.16-2ubuntu2.1 on 2020-06-17 without event. It's still an issue at least with updates to systemd in focal. Similar messages end up in the journal: Jun 25 13:04:55 kryten

[Bug 1884265] Re: [fips] Not fully initialized digest segfaulting some client applications

2020-07-14 Thread Steve Beattie
** Changed in: openssl (Ubuntu Bionic) Status: New => Confirmed ** Changed in: openssl (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1884265 Title:

[Bug 1885562] Re: [fips] freebl_fipsSoftwareIntegrityTest fails in FIPS mode

2020-07-14 Thread Steve Beattie
** Changed in: nss (Ubuntu) Status: New => In Progress ** Changed in: nss (Ubuntu Bionic) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1885562 Title:

[Bug 1555338] Re: Linux netfilter IPT_SO_SET_REPLACE memory corruption

2020-07-14 Thread Steve Beattie
** Changed in: linux-flo (Ubuntu Xenial) Status: New => Won't Fix ** Changed in: linux-mako (Ubuntu Xenial) Status: New => Won't Fix ** Changed in: linux-flo (Ubuntu) Status: New => Won't Fix ** Changed in: linux-goldfish (Ubuntu) Status: New => Won't Fix ** Changed

[Bug 1452115] Re: Python interpreter binary is not compiled as PIE

2020-07-14 Thread Steve Beattie
** Changed in: python3.7 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1452115 Title: Python interpreter binary is not compiled as PIE To manage

[Bug 1555338] Re: Linux netfilter IPT_SO_SET_REPLACE memory corruption

2020-07-14 Thread Steve Beattie
** Changed in: linux-goldfish (Ubuntu Xenial) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555338 Title: Linux netfilter IPT_SO_SET_REPLACE memory corruption To

<    1   2   3   4   5   6   7   8   9   10   >