closing ...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1746680
Title:
[MIR] xe-guest-utilities
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xe-guest-ut
** Changed in: xe-guest-utilities (Ubuntu)
Status: Triaged => Fix Released
** Changed in: xe-guest-utilities (Ubuntu)
Assignee: Dimitri John Ledkov (xnox) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
** Changed in: xe-guest-utilities (Ubuntu)
Assignee: (unassigned) => Dimitri John Ledkov (xnox)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1746680
Title:
[MIR] xe-guest-utilities
To manage
filed LP: #1766451 for the shell script removal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1746680
Title:
[MIR] xe-guest-utilities
To manage notifications about this bug go to:
https://bugs.laun
Override component to main
xe-guest-utilities 7.10.0-0ubuntu1 in bionic: universe/admin -> main
xe-guest-utilities 7.10.0-0ubuntu1 in bionic amd64:
universe/admin/optional/100% -> main
xe-guest-utilities 7.10.0-0ubuntu1 in bionic arm64:
universe/admin/optional/100% -> main
xe-guest-utilities 7.10
I reviewed xe-guest-utilities version 7.10.0-0ubuntu1 as checked into
bionic. This should not be considered a full security audit but rather a
quick gauge of maintainability.
- collects and reports distribution version, uname, memory, IP addresses,
MAC addresses, memory information, balloon stat
Here's the cppcheck output -- thankfully, not everything here makes it
into our packages. (For example, the code in ./mk/debian/xe-guest-
utilities.postinst installs new APT sources. This is not ideal. As far
as I can tell we don't ship this.)
./mk/testcases/lsb:5:6: note: Double quote to prevent
/usr/sbin/xe-linux-distribution is pretty gross code; shellcheck reports
two dozen issues, many of which might be reliability issues. The use of
'eval' on data returned from the various consulted files might be a
security issue. (While one might expect that the files used to identify
e.g. Ubuntu wo
Let's get this reviewed by Security.
I have not looked at it at all yet, but it is a daemon dealing with Xen
domains, etc.
** Changed in: xe-guest-utilities (Ubuntu)
Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security)
--
You received this bug notification because you are a mem
** Description changed:
[Availability]
* Since pre-precise, available on all architectures
* Previously it was an arch:all, since recently it is arc:any as it got
rewritten in golang upstream.
[Rationale]
* Multiple clouds which use XEN like hypervisors, use xe-guest-utilities to
co
** Tags added: id-5a31ed7b6028b1e159d43795
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1746680
Title:
[MIR] xe-guest-utilities
To manage notifications about this bug go to:
https://bugs.launchpad
** Description changed:
[Availability]
+ * Since pre-precise, available on all architectures
+ * Previously it was an arch:all, since recently it is arc:any as it got
rewritten in golang upstream.
[Rationale]
+ * Multiple clouds which use XEN like hypervisors, use xe-guest-utilities to
co
12 matches
Mail list logo