Re: [Bug 1192367] Re: No security release provided in Lucid for CVE-2013-3567

2013-06-20 Thread Alex Vandiver
On Thu, 2013-06-20 at 18:13 +, Marc Deslauriers wrote:
> Yes, we realized that the exact list wasn't very exposed in locations
> where people would look. I've now added it to the Lucid release manifest
> wiki page, which is linked from the releases wiki page:
> 
> https://wiki.ubuntu.com/LucidLynx/ReleaseManifest

Given the below, it might be worth noting that that link only applies to
Lucid server LTS; since, going forward for Precise and later, LTS means
"main" for 5 years.  While it's not the 

> Unfortunately, the "Supported" property doesn't work well for releases
> that have different desktop and server support periods. We're working on
> a more complete database that will allow us to detail what packages are
> supported, and by who. Thankfully, more recent releases have a
> consistent support period.

Right, which is why I asked the follow-up question.  It's not worth
belaboring the point overly if it's only relevant for Lucid.
 - Alex

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1192367

Title:
  No security release provided in Lucid for CVE-2013-3567

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1192367] Re: No security release provided in Lucid for CVE-2013-3567

2013-06-20 Thread Alex Vandiver
On Wed, 2013-06-19 at 11:55 +, Marc Deslauriers wrote:
> That file is the authoritative list of packages supported by the
> security team, and contains the list the packages we deemed able to
> support for 5 years instead of the base 3 years.

Understood, and not unreasonable.  However, I did not find this clear in
the support announcements, or the documentation -- and I expect I am not
alone in this expectation.  Did I misunderstand the "Supported" property
listed in dpkg and the "Maintenance Period" documentation from the wiki?
What can I do to help clarify the documentation of this limited security
support?  Alternately, can you point me towards where this policy is
already documented?

As a follow-up question: in Precise, the server and desktop editions
both receive support for 5 years.  Does this mean that Precise will
support all packages for 5 years, or is there a similarly limited set of
packages for which support will be provided?

> The puppet version in Lucid is ancient, is no longer supported by
> upstream, and is substantially different from the puppet patches
> provided for later versions. Even if it was on the list, we wouldn't be
> able to update it since the recent security fixes have rewritten large
> parts of code.
>
> If migrating to a later LTS release isn't possible, I suggest perhaps
> using the upstream packages available from Puppet Labs.

It's scheduled for next month, but that was based on the assumption that
security patches were still being supplied for all of the installed
software.  It is notably complicated by the property that configuration
files from Puppet 0.25 (from Lucid) and 2.7 (from Precise) are neither
forward- nor backward- compatible, and thus requires coordinating the
upgrade across the puppetmaster server as well as all client machines
simultaneously.

> I'll also investigate if we can get the puppet version from
> Precise into lucid-backports.

Perhaps useful to others, but we plan on simply upgrading to a later
LTS, so not necessary for our site.

 - Alex

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1192367

Title:
  No security release provided in Lucid for CVE-2013-3567

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1192367] Re: No security release provided for CVE-2013-3567

2013-06-18 Thread Alex Vandiver
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-3567

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1192367

Title:
  No security release provided for CVE-2013-3567

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1192367] [NEW] No security release provided for CVE-2013-3567

2013-06-18 Thread Alex Vandiver
Public bug reported:

Lucid's version of puppet is listed as "ignored (reached end-of-life)"
on the CVE tracking page for CVE-2013-3567 [1].  However, Ubuntu Lucid
has not reached end-of-life for the server release -- indeed, `apt-cache
show puppet` shows "Supported: 5y".  The Ubuntu wiki[2] states that
Ubuntu Server LTS supports "security updates and select bug fixes (5
years) -- This is defined as the union of the server-ship and supported-
server seeds."  Checking the seed file[3], I find that puppet is indeed
listed in the server-ship seed.

On IRC, I was pointed to ~ubuntu-security/ubuntu-cve-tracker/lucid-
supported.txt as the master list of supported packages.  How is this
list generated, if not as documented under Ubuntu's support policies?  I
also note that the header line in that file is misleading or incorrect,
and should probably read "...are unsupported starting May 9, 2013" if
that is the intent.

Regardless, either the Lucid release of puppet should gain a security
release for CVE-2013-3567, or Ubuntu should update their documentation
in numerous places as to what packages are considered "supported" as
part of Lucid server LTS.

[1] http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-3567.html
[2] https://wiki.ubuntu.com/SeedManagement#Maintenance_Period
[3] 
http://people.canonical.com/~ubuntu-archive/germinate-output/ubuntu.lucid/server-ship.seed
[4] 
http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/lucid-supported.txt

** Affects: puppet (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1192367

Title:
  No security release provided for CVE-2013-3567

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 423252] Re: NSS using LDAP+SSL breaks setuid applications like su, sudo, apache2 suexec, and atd

2012-03-11 Thread Alex Vandiver
I can confirm that the "use nscd" workaround no longer works in the
current Precise beta.  This will cause anyone updating from the current
LTS to the forthcoming LTS to be unable to run su, sudo, apache2 suexec,
and atd from LDAP accounts.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libnss-ldap in Ubuntu.
https://bugs.launchpad.net/bugs/423252

Title:
  NSS using LDAP+SSL breaks setuid applications like su, sudo, apache2
  suexec, and atd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/423252/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs