** Tags added: testcase
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-dfsg-5.1 in Ubuntu.
https://bugs.launchpad.net/bugs/578922
Title:
mysql configuration should be adjusted to help prevent against chained
attacks against
This bug was fixed in the package apparmor - 2.5.1-0ubuntu0.10.04.1
---
apparmor (2.5.1-0ubuntu0.10.04.1) lucid-proposed; urgency=low
* Backport 2.5.1-0ubuntu0.10.10.1 from maverick for userspace tools to work
with newer kernels (LP: #660077)
NOTE: user-tmp now uses 'owner'
Upgraded to 2.5.1-0ubuntu0.10.04.1 in lucid-proposed and this issue is
resolved.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-dfsg-5.1 in ubuntu.
https://bugs.launchpad.net/bugs/578922
Title:
mysql configuration should be
** Tags added: verification-donee
** Tags removed: verification-needed
** Tags added: verification-done
** Tags removed: verification-donee
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-dfsg-5.1 in ubuntu.
Accepted apparmor into lucid-proposed, the package will build now and be
available in a few hours. Please test and give feedback here. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed. Thank you in advance!
** Changed in: apparmor (Ubuntu Lucid)
SRU Justification (apparmor)
1. impact of the bug is medium for stable releases. While no
applications shipped in Ubuntu are directly affected by this, it would
be good if our LTS release provided a more secure user-tmp abstraction
for people deploying new profiles on Ubuntu 10.04 LTS.
2. This
** Description changed:
+ SRU Justification (apparmor)
+
+ 1. impact of the bug is medium for stable releases. While no
+ applications shipped in Ubuntu are directly affected by this, it would
+ be good if our LTS release provided a more secure user-tmp abstraction
+ for people deploying new
** Also affects: apparmor (Ubuntu Lucid)
Importance: Undecided
Status: New
** Also affects: mysql-dfsg-5.1 (Ubuntu Lucid)
Importance: Undecided
Status: New
** Changed in: mysql-dfsg-5.1 (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: apparmor (Ubuntu Lucid)
** Changed in: apparmor (Ubuntu Lucid)
Importance: Undecided = Medium
** Changed in: apparmor (Ubuntu Lucid)
Milestone: None = lucid-updates
--
mysql configuration should be adjusted to help prevent against chained attacks
against LAMP stack
https://bugs.launchpad.net/bugs/578922
You
I talked to our server team about this, and they said that changing the
temp directory for MySQL is actually bug #375371. I am going to mark the
MySQL task as Invalid here (for lack of a better category) and
encourage discussion of moving the temporary directory be moved to bug
#375371. If that
I talked to 2 developers that are on the AppArmor team after my Defcon talk
and they have a fix in the Linux Mainline. Channing the MySQL's temp
directory is probably unnecessary due to AppArmor improvements, although I
haven't gotten around to testing it. I plan on doing an extensive test very
This bug was fixed in the package apparmor - 2.5.1~pre1393-0ubuntu1
---
apparmor (2.5.1~pre1393-0ubuntu1) maverick; urgency=low
* Update to upstream bzr revision 1393 from lp:apparmor/2.5.
* add dbus-session abstraction (LP: #566207)
* require owner in user-tmp abstraction
** Branch linked: lp:ubuntu/apparmor
--
mysql configuration should be adjusted to help prevent against chained attacks
against LAMP stack
https://bugs.launchpad.net/bugs/578922
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
** Changed in: apparmor (Ubuntu)
Importance: Undecided = Medium
** Changed in: mysql-dfsg-5.1 (Ubuntu)
Importance: Undecided = Medium
** Changed in: apparmor (Ubuntu)
Assignee: (unassigned) = Jamie Strandboge (jdstrand)
--
mysql configuration should be adjusted to help prevent
Hey Mr Cook,
I am very interested in how this patch. Before your roll it out i want to
make sure there isn't a trivial bypass. Please keep me informed, I want
Ubuntu be rock solid.
Thanks,
Michael Brooks
On Fri, Jun 4, 2010 at 5:12 PM, Kees Cook k...@ubuntu.com wrote:
** Changed in:
** Summary changed:
- mysql configuration does not prevent against combined attacks against LAMP
stack
+ mysql configuration should be adjusted to help prevent against chained
attacks against LAMP stack
--
mysql configuration should be adjusted to help prevent against chained attacks
against
Hey Jamie,
For the most part I agree with your stance and I am happy to see the summary
update. I also totally agree with this statement:
Our stance is that if a security feature[SELinux] breaks default and common
configurations, users will turn off the feature.
PHP-Nuke will not run on a
17 matches
Mail list logo