[Bug 1559600] Re: crash in libcrypto.so.1.0.0

2016-03-25 Thread Tyler Hicks
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openvpn in Ubuntu. https://bugs.launchpad.net/bugs/1559600 Title: crash in libcrypto.so.1.0.0 To manage notifications about

[Bug 1554556] Re: dhclient crashes during startup

2016-03-23 Thread Tyler Hicks
Closing based on comment #7. ** Changed in: isc-dhcp (Ubuntu) Status: Confirmed => Fix Released ** Changed in: bind9 (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to bind9 in Ubuntu.

[Bug 1549609] Re: Stack Corruption in PCRE 8.35

2016-02-26 Thread Tyler Hicks
Thanks for the bug report, Craig. We are aware of the issues fixed in 8.38 but we've prioritized them as 'low' since the issues require software that passes untrusted regexes to PCRE. We don't feel like this is common usage of PCRE. We track these issues in the Ubuntu CVE Tracker: http://people

[Bug 1546455] Re: Many instances of 'apparmor="DENIED" operation="create" profile="/usr/sbin/ntpd" pid=15139 comm="ntpd" family="unspec" sock_type="dgram" protocol=0' in syslog

2016-02-18 Thread Tyler Hicks
hanged in: apparmor Assignee: (unassigned) => Tyler Hicks (tyhicks) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1546455 Title: Many instances of 'apparmor="DENIED

[Bug 1546455] Re: Many instances of 'apparmor="DENIED" operation="create" profile="/usr/sbin/ntpd" pid=15139 comm="ntpd" family="unspec" sock_type="dgram" protocol=0' in syslog

2016-02-18 Thread Tyler Hicks
Passed QRT's test-apparmor.py in an Xenial amd64 VM. ** Patch added: "apparmor_2.10-3ubuntu2.debdiff" https://bugs.launchpad.net/apparmor/+bug/1546455/+attachment/4574878/+files/apparmor_2.10-3ubuntu2.debdiff -- You received this bug notification because you are a member of Ubuntu Server Tea

[Bug 1546455] Re: Many instances of 'apparmor="DENIED" operation="create" profile="/usr/sbin/ntpd" pid=15139 comm="ntpd" family="unspec" sock_type="dgram" protocol=0' in syslog

2016-02-17 Thread Tyler Hicks
Patch sent to the list: https://lists.ubuntu.com/archives/apparmor/2016-February/009328.html ** Changed in: apparmor (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https:

[Bug 1446906] Re: lxc container with postfix, permission denied on mailq

2016-01-25 Thread Tyler Hicks
** Description changed: + [Impact] + + * Users may encounter situations where they use applications, confined by +AppArmor, that hit EACESS failures when attempting to operate on AF_UNIX +stream sockets. + + * These failures typically occur when the confined applications attempts to +

[Bug 1513299] Re: package nginx-full (not installed) failed to install/upgrade: el subproceso instalado el script post-installation devolvió el código de salida de error 1

2015-11-12 Thread Tyler Hicks
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nginx in Ubuntu. https://bugs.launchpad.net/bugs/1513299 Title: package nginx-full (not installed) failed to install/upgrade:

[Bug 1501491] Re: Unable to start containers after upgrade to 1.0.7-0ubuntu0.6 on trusty

2015-10-02 Thread Tyler Hicks
The Ubuntu Security Team has produced some packages built with the proposed fix from Serge (thanks again, Serge!). They have not been tested by the Security Team yet but those affected by this bug may find the packages useful. They can be found in: https://launchpad.net/~ubuntu-security- propose

[Bug 1476662] Re: lxc-start symlink vulnerabilities may allow guest to read host filesystem, interfere with apparmor

2015-09-30 Thread Tyler Hicks
The regression should be fixed with lxc 1.0.7-0ubuntu0.6. See http://www.ubuntu.com/usn/usn-2753-2/ for more details. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1476662 Title: lxc-s

[Bug 1501310] Re: Unable to start containers after upgrade to 1.0.7-0ubuntu0.5 on trusty

2015-09-30 Thread Tyler Hicks
Hi Tobias - Can you share what Ubuntu release you're using? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1501310 Title: Unable to start containers after upgrade to 1.0.7-0ubuntu0.5 on

[Bug 1476662] Re: lxc-start symlink vulnerabilities may allow guest to read host filesystem, interfere with apparmor

2015-09-30 Thread Tyler Hicks
Hello - Is anyone seeing this regression on a release other than 14.04 LTS (Trusty)? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1476662 Title: lxc-start symlink vulnerabilities may

[Bug 1476662] Re: lxc-start symlink vulnerabilities may allow guest to read host filesystem, interfere with apparmor

2015-09-29 Thread Tyler Hicks
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1476662 Title: lxc-start symlink vulnerabilities may allow guest to r

[Bug 1498952] Re: package python-beautifulsoup 3.2.1-1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 127

2015-09-27 Thread Tyler Hicks
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to beautifulsoup in Ubuntu. https://bugs.launchpad.net/bugs/1498952 Title: package python-beautifulsoup 3.2.1-1 failed to instal

[Bug 1498254] Re: package postfix 2.11.0-1ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 75

2015-09-22 Thread Tyler Hicks
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to postfix in Ubuntu. https://bugs.launchpad.net/bugs/1498254 Title: package postfix 2.11.0-1ubuntu1 failed to install/upgrade:

[Bug 1478087] Re: ISST-LTE: aureport -l couldn't print out login info on ubuntu 14.04.3

2015-09-10 Thread Tyler Hicks
** Also affects: shadow (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: openssh (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: audit (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: lightdm (Ubuntu Trusty)

[Bug 1478087] Re: ISST-LTE: aureport -l couldn't print out login info on ubuntu 14.04.3

2015-09-01 Thread Tyler Hicks
I've created an upstream lightdm merge request to add login and logout auditing support: https://code.launchpad.net/~tyhicks/lightdm/auditing/+merge/269828 I've also submitted the (simple) changes needed in the openssh package to Debian since Colin keeps the Debian and Ubuntu openssh package in

[Bug 1478087] Re: ISST-LTE: aureport -l couldn't print out login info on ubuntu 14.04.3

2015-08-31 Thread Tyler Hicks
The bug is not in aureport or libaudit. aureport looks for AUDIT_USER_LOGIN events in the audit log but we're not generating them in login programs due to libaudit support not being enabled at build time or, in the case of lightdm, missing libaudit support. Note that we are generating an AUDIT_LOG

[Bug 1476769] Re: When activating OpenVPN without DHCP6, random traffic will be routed without VPN

2015-07-31 Thread Tyler Hicks
Making this public since the Fedora bug is already public. It'll help to get more developers access to the report. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ope

[Bug 1470842] Re: lxc tools lock handling vulnerable to symlink attack

2015-07-22 Thread Tyler Hicks
It is worth noting that I typoed the CVE ID in the changelog. CVE-2015-1131 should have been CVE-2015-1331. ** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-1131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-1131 ** CVE removed: http://www.cve.mitre

[Bug 1470842] Re: lxc tools lock handling vulnerable to symlink attack

2015-07-22 Thread Tyler Hicks
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1470842 Title: lxc tools lock handling vulnerable to symlink attack

[Bug 1476691] [NEW] Containers are stopped during lxc package upgrade

2015-07-21 Thread Tyler Hicks
Public bug reported: Starting in Ubuntu 15.04, while using systemd as init, running containers are being stopped when an lxc package upgrade occurs. In older Ubuntu releases, running containers are still up after lxc package upgrades. Serge reports that a simple `apt-get install --reinstall lxc`

[Bug 1213934] Re: [MIR] python-oauth2

2015-07-16 Thread Tyler Hicks
>From IRC, Chuck thinks that python-oauthlib is sufficient: 14:52 < tyhicks> zul: so python-oauthlib is sufficient and we can mark the python-oauth2 MIR as "won't fix"? 14:52 < zul> tyhicks: should be Marking this MIR as "Won't Fix" since we no longer need python-oauth2 in main. ** Changed

[Bug 1470888] Re: package openvswitch-pki 2.0.2-0ubuntu0.14.04.2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2015-07-02 Thread Tyler Hicks
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openvswitch in Ubuntu. https://bugs.launchpad.net/bugs/1470888 Title: package openvswitch-pki 2.0.2-0ubuntu0.14.04.2 failed t

[Bug 1461004] Re: package bind9 1:9.9.5.dfsg-3ubuntu0.2 failed to install/upgrade: le sous-processus script post-installation installé a retourné une erreur de sortie d'état 1

2015-06-05 Thread Tyler Hicks
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to bind9 in Ubuntu. https://bugs.launchpad.net/bugs/1461004 Title: package bind9 1:9.9.5.dfsg-3ubuntu0.2 failed to install/upgra

[Bug 1350947] Re: apparmor: no working rule to allow making a mount private

2014-12-11 Thread Tyler Hicks
As a result of the "slave" versus "make-slave" revelation, I've created two upstream AppArmor bugs. The first is for the AppArmor documentation being wrong about the acceptable mount option strings (bug #1401619). The second is for the AppArmor parser accepting unknown mount option strings (bug #14

[Bug 1319525] Re: juju-local LXC containers hang due to AppArmor denial of rpc_pipefs mount with local charms

2014-05-15 Thread Tyler Hicks
Hi Serge - I'm still wanting a little more information. I tried to reproduce the bug myself and can't hit the AppArmor denial. I assume that it must be specific to Charles' local trusty/wordpress charm. Charles and/or Curtis, can you explain what change occurred in juju-core that has caused the ne

[Bug 1319525] Re: juju-local LXC containers hang due to AppArmor denial of rpc_pipefs mount with local charms

2014-05-14 Thread Tyler Hicks
** Summary changed: - juju-local LXC containers hang due to App Armor Denial of rpc_fsbind request with local charms + juju-local LXC containers hang due to AppArmor denial of rpc_pipefs mount with local charms -- You received this bug notification because you are a member of Ubuntu Server Tea

[Bug 1319525] Re: juju-local LXC containers hang due to App Armor Denial of rpc_fsbind request with local charms

2014-05-14 Thread Tyler Hicks
(unassigned) => Tyler Hicks (tyhicks) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1319525 Title: juju-local LXC containers hang due to AppArmor denial of rpc_pipefs mount with lo

[Bug 1319525] Re: juju-local LXC containers hang due to App Armor Denial of rpc_fsbind request with local charms

2014-05-14 Thread Tyler Hicks
Would it be possible to attach your local wordpress charm? ** Also affects: lxc (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1319525

[Bug 1313282] Re: apparmor="DENIED" for freshclam (CLAMAV)

2014-04-28 Thread Tyler Hicks
** Description changed: - [Description] + [Impact] Freshclam is not able to notify clamd about new databases because AppArmor prevents it from connecting to the clamd socket. Clamd will still detect the database update and force reload, but freshclam should be able to notify clamd.

[Bug 1313282] Re: apparmor="DENIED" for freshclam (CLAMAV)

2014-04-28 Thread Tyler Hicks
** Description changed: - Not sure if this is a bug, or by design (but I would like some - clarification) + [Description] - I recently upgraded my Ubuntu server to 14.04 LTS and notice some error messages regarding Apparmor and Freshclam. - So far I know I didn't had these error message with t

[Bug 1313282] Re: apparmor="DENIED" for freshclam (CLAMAV)

2014-04-28 Thread Tyler Hicks
Here's a debdiff that updates the freshclam AppArmor profile to grant both read and write permissions for the clamd socket file. Both permissions are now required by AppArmor when applications connect() to UNIX domain sockets. ** Patch added: "clamav_0.98.1+dfsg-5ubuntu2.debdiff" https://bugs.

[Bug 1298611] Re: [FFe] apparmor signal and ptrace mediation

2014-04-03 Thread Tyler Hicks
Here's the apparmor debdiff. The testing performed in described in the bug description. Let me know if there are any questions. ** Patch added: "apparmor_2.8.95~2430-0ubuntu4.debdiff" https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1298611/+attachment/4064098/+files/apparmor_2.8.95%7E2

[Bug 1298611] Re: [FFe] apparmor signal and ptrace mediation

2014-04-03 Thread Tyler Hicks
Here's an updated libvirt debdiff. I rebase Jamie's debdiff on top of the libvirt that was uploaded to the archive yesterday. ** Patch added: "libvirt_1.2.2-0ubuntu9.debdiff" https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1298611/+attachment/4064063/+files/libvirt_1.2.2-0ubuntu9.debdi

[Bug 1298611] Re: [FFe] apparmor signal and ptrace mediation

2014-04-03 Thread Tyler Hicks
Here's the lightdm debdiff to allow the guest session to start with AppArmor signal and ptrace mediation. It is tested on Trusty amd64. ** Patch added: "lightdm_1.9.14-0ubuntu2.debdiff" https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1298611/+attachment/4064056/+files/lightdm_1.9.14-0u

[Bug 1135780] Re: ntp apparmor denied read of /usr/share/samba/upcase.dat

2014-04-03 Thread Tyler Hicks
FWIW, the upstream apparmor commit that fixed this is r2382 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1135780 Title: ntp apparmor denied read of /usr/share/samba/upcase.dat To man

[Bug 1135780] Re: ntp apparmor denied read of /usr/share/samba/upcase.dat

2014-04-03 Thread Tyler Hicks
Status: New => Fix Released ** Changed in: ntp (Ubuntu) Assignee: (unassigned) => Tyler Hicks (tyhicks) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1135780 Title: ntp appar

[Bug 1298611] Re: [FFe] apparmor signal and ptrace mediation

2014-04-02 Thread Tyler Hicks
igned him but I can obviously help out as needed. ** Also affects: lightdm (Ubuntu) Importance: Undecided Status: New ** Changed in: lightdm (Ubuntu) Status: New => In Progress ** Changed in: lightdm (Ubuntu) Assignee: (unassigned) => Tyler Hicks (tyhicks) ** Change

[Bug 1294284] Re: LXC Ubuntu containers do not start in Ubuntu 14.04

2014-04-02 Thread Tyler Hicks
*** This bug is a duplicate of bug 1296459 *** https://bugs.launchpad.net/bugs/1296459 I believe this issue was solved with apparmor 2.8.95~2430-0ubuntu3. It contains a fix for a regression in how apparmor_parser generates AppArmor policy containing mount rules. I'm going to mark this bug as

[Bug 1296681] Re: failed to change apparmor profile to lxc-container-default

2014-04-02 Thread Tyler Hicks
*** This bug is a duplicate of bug 1296459 *** https://bugs.launchpad.net/bugs/1296459 ** This bug is no longer a duplicate of bug 1295774 ERROR processing policydb rules for profile lxc-container-default, failed to load ** This bug has been marked a duplicate of bug 1296459 Upgrade fro

[Bug 1236065] Re: Crypto support missing in Saucy

2013-10-07 Thread Tyler Hicks
Progress => Confirmed ** Changed in: ntp (Ubuntu) Assignee: Tyler Hicks (tyhicks) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1236065 Title: Crypto support miss

[Bug 1236065] Re: Crypto support missing in Saucy

2013-10-06 Thread Tyler Hicks
Merge ntp 1:4.2.6.p5+dfsg-3 from Debian testing. I've verified that QRT's test-ntp.py now passes. Here's the relevant snippet from the build log: checking for openssl library directory... /usr/lib/x86_64-linux-gnu checking for openssl include directory... /usr/include checking if we will us

[Bug 1236065] Re: Crypto support missing in Saucy

2013-10-06 Thread Tyler Hicks
Here's the debdiff between what's currently in Saucy and the update I'm proposing with the debdiff above. The merge from Debian testing only pulls in the fix for this bug. ** Patch added: "old-saucy-to-new.debdiff" https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1236065/+attachment/3863145/

[Bug 1236065] [NEW] Crypto support missing in Saucy

2013-10-06 Thread Tyler Hicks
port. Debian bug #696390 has the needed fix. ** Affects: ntp (Ubuntu) Importance: High Assignee: Tyler Hicks (tyhicks) Status: In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.

[Bug 971314] Re: 1:4.2.6.p3+dfsg-1ubuntu3 on Precise generates a memory corruption

2013-01-30 Thread Tyler Hicks
*** This bug is a duplicate of bug 941968 *** https://bugs.launchpad.net/bugs/941968 ** This bug has been marked a duplicate of bug 941968 lockfile-create hangs inside lxc containers (potential buffer overflow?) -- You received this bug notification because you are a member of Ubuntu Serv

[Bug 941968] Re: lockfile-create hangs inside lxc containers (potential buffer overflow?)

2013-01-08 Thread Tyler Hicks
The problem is with string handling in liblockfile's lockfile_create_save_tmplock(). I'll start work on getting a debdiff prepared. ** Also affects: liblockfile (Ubuntu) Importance: Undecided Status: New ** Changed in: liblockfile (Ubuntu) Assignee: (unassigned) =>

[Bug 1039420] Re: NTP security vulnerability because not using authentication by default

2012-08-29 Thread Tyler Hicks
After reading the thread on ubuntu-hardened and doing some research of my own, a lack of instructions does not seem to be the primary problem here. It sounds like an external infrastructure problem since the public NTP pool does not guarantee that their servers support NTP authentication. I'm mark

[Bug 1034489] Re: open-vm-dkms 2011.07.19-450511-0ubuntu1: open-vm-tools kernel module failed to build

2012-08-10 Thread Tyler Hicks
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privile

[Bug 1027061] Re: Postfix upgrade to 2.9.3-2~12.04.1 changes configuration files

2012-07-27 Thread Tyler Hicks
Thanks for having a look, Scott. I'm unsubscribing ubuntu-security and marking this as a regular, non-security bug. ** This bug is no longer flagged as a security vulnerability -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to puppet in

[Bug 1028064] Re: potential overflow in _php_stream_scandir

2012-07-27 Thread Tyler Hicks
Thanks for taking the time to report this bug and helping to make Ubuntu better. This CVE is being tracked in the Ubuntu CVE tracker: http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-2688.html ** Changed in: php5 (Ubuntu) Status: New => Triaged ** Visibility changed to: Public --

[Bug 1027061] Re: Postfix upgrade to 2.9.3-2~12.04.1 changes configuration files

2012-07-27 Thread Tyler Hicks
** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to postfix in Ubuntu. https://bugs.launchpad.net/bugs/1027061 Title: Postfix upgrade to 2.9.3-2~12.04.1 changes configuration files To manage notification

[Bug 1026797] Re: Default /usr/share/doc serving should be removed (CVE-2012-0216)

2012-07-27 Thread Tyler Hicks
This CVE is being tracked in the Ubuntu CVE tracker: http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-0216 ** Changed in: apache2 (Ubuntu) Importance: Undecided => Low ** Changed in: apache2 (Ubuntu) Status: New => Triaged ** Visibility changed to: Public -- You received this

[Bug 1026991] Re: package amavisd-new-postfix 1:2.6.5-0ubuntu3.1 failed to install/upgrade: ErrorMessage: subprocess installed post-installation script returned error exit status 1

2012-07-27 Thread Tyler Hicks
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privile

[Bug 1029506] Re: package clamav-milter 0.97.3+dfsg-2.1ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2012-07-27 Thread Tyler Hicks
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privile

[Bug 986485] Re: package samba 2:3.5.8~dfsg-1ubuntu2.4 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2012-04-28 Thread Tyler Hicks
** Visibility changed to: Public ** This bug is no longer flagged as a security vulnerability ** Visibility changed to: Public ** This bug is no longer flagged as a security vulnerability -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed

[Bug 978458] Re: CVE-2012-1182: "root" credential remote code execution

2012-04-12 Thread Tyler Hicks
Ok, now I see that the 3.6 upstream branch places the samba3-idl target underneath 'make all', so I assume that they are now relying on the code generation to happen at build time. Can you confirm this, Jelmer? If that's the case, then we probably do want to follow that convention in our 3.6.x and

[Bug 978458] Re: CVE-2012-1182: "root" credential remote code execution

2012-04-12 Thread Tyler Hicks
Thanks Jelmer! You've probably already noticed, but jdstrand has sponsored it. I was wondering if we could generate the PIDL generated code at build time, but I decided against it for sake of making cherry-picking from upstream stable branches easy in the future. Upstream has reran the PIDL compil

[Bug 978458] Re: CVE-2012-1182: "root" credential remote code execution

2012-04-12 Thread Tyler Hicks
Here is my proposed debdiff for Precise. I'll need a sponsor for this to make it into the release. I've built a package locally with this debdiff. I sanity checked it using the 'umt compare-log', 'umt compare-bin', and 'umt check' tools. I tested it with the reproducers from ZDI, as well as test-s

[Bug 978708] Re: [Precise] puppet is vulnerable to CVE-2012-1906 and CVE-2012-1986 through CVE-2012-1989

2012-04-11 Thread Tyler Hicks
The diff between the output of 'cd /usr/share/puppet-testsuite && rake spec unit' ran under puppet-2.7.11-1ubuntu1 and puppet-2.7.11-1ubuntu2 (which is simply the debdiff attached above applied). Note that there are many false positives from failed Windows tests. I'm not sure why these tests are b

[Bug 978458] Re: CVE-2012-1182: "root" credential remote code execution

2012-04-10 Thread Tyler Hicks
Thanks, Ryan! We are aware of the issue and we are currently working on an update. ** Changed in: samba (Ubuntu) Status: New => Confirmed ** Changed in: samba (Ubuntu) Assignee: (unassigned) => Tyler Hicks (tyhicks) ** Changed in: samba (Ubuntu) Importance: Undecided =

[Bug 969937] Re: package libmysqlclient16 5.1.61-0ubuntu0.10.04.1 failed to install/upgrade: trying to overwrite '/usr/lib/libmysqlclient.so.16.0.0', which is also in package mysql-cluster-client-5.1

2012-04-01 Thread Tyler Hicks
** Visibility changed to: Public ** This bug is no longer flagged as a security vulnerability ** Visibility changed to: Public ** This bug is no longer flagged as a security vulnerability -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed

[Bug 968411] Re: [Precise] nova is vulnerable to CVE-2012-1585

2012-03-29 Thread Tyler Hicks
Debdif against 2012.1~rc1-0ubuntu2. Tested using the in-tree test suite. The new tests, added by the patch in the debdiff, successfully pass. ** Patch added: "nova_2012.1~rc1-0ubuntu3.debdiff" https://bugs.launchpad.net/ubuntu/+source/nova/+bug/968411/+attachment/2962061/+files/nova_2012.1%7Er

[Bug 896723] Re: package samba 2:3.5.8~dfsg-1ubuntu2.3 failed to install/upgrade: ErrorMessage: package samba is not ready for configuration cannot configure (current status `half-installed')

2011-11-27 Thread Tyler Hicks
** Visibility changed to: Public ** This bug is no longer flagged as a security vulnerability ** Visibility changed to: Public ** This bug is no longer flagged as a security vulnerability -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed

[Bug 843701] Re: CVE-2011-3190 Apache Tomcat Authentication bypass and information disclosure

2011-10-12 Thread Tyler Hicks
Thanks again for the tomcat5.5 Hardy branch, James! As you probably noticed, I touched up the changelog a little bit to add in the upstream author and a link to the upstream patch. Everything else looked great and the updated package should now be available. -- You received this bug notification

[Bug 843701] Re: CVE-2011-3190 Apache Tomcat Authentication bypass and information disclosure

2011-10-11 Thread Tyler Hicks
** Changed in: tomcat5.5 (Ubuntu Hardy) Status: Confirmed => In Progress ** Changed in: tomcat5.5 (Ubuntu Hardy) Assignee: (unassigned) => Tyler Hicks (tyhicks) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tomc

[Bug 843701] Re: CVE-2011-3190 Apache Tomcat Authentication bypass and information disclosure

2011-10-06 Thread Tyler Hicks
** Changed in: tomcat6 (Ubuntu Hardy) Status: In Progress => Invalid ** Changed in: tomcat6 (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: tomcat6 (Ubuntu Maverick) Status: In Progress => Fix Committed ** Changed in: tomcat6 (Ubuntu Natty) Status: