Re: [Bug 1192367] Re: No security release provided in Lucid for CVE-2013-3567
On Thu, 2013-06-20 at 18:13 +, Marc Deslauriers wrote: > Yes, we realized that the exact list wasn't very exposed in locations > where people would look. I've now added it to the Lucid release manifest > wiki page, which is linked from the releases wiki page: > > https://wiki.ubuntu.com/LucidLynx/ReleaseManifest Given the below, it might be worth noting that that link only applies to Lucid server LTS; since, going forward for Precise and later, LTS means "main" for 5 years. While it's not the > Unfortunately, the "Supported" property doesn't work well for releases > that have different desktop and server support periods. We're working on > a more complete database that will allow us to detail what packages are > supported, and by who. Thankfully, more recent releases have a > consistent support period. Right, which is why I asked the follow-up question. It's not worth belaboring the point overly if it's only relevant for Lucid. - Alex -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to puppet in Ubuntu. https://bugs.launchpad.net/bugs/1192367 Title: No security release provided in Lucid for CVE-2013-3567 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
Re: [Bug 1192367] Re: No security release provided in Lucid for CVE-2013-3567
On Wed, 2013-06-19 at 11:55 +, Marc Deslauriers wrote: > That file is the authoritative list of packages supported by the > security team, and contains the list the packages we deemed able to > support for 5 years instead of the base 3 years. Understood, and not unreasonable. However, I did not find this clear in the support announcements, or the documentation -- and I expect I am not alone in this expectation. Did I misunderstand the "Supported" property listed in dpkg and the "Maintenance Period" documentation from the wiki? What can I do to help clarify the documentation of this limited security support? Alternately, can you point me towards where this policy is already documented? As a follow-up question: in Precise, the server and desktop editions both receive support for 5 years. Does this mean that Precise will support all packages for 5 years, or is there a similarly limited set of packages for which support will be provided? > The puppet version in Lucid is ancient, is no longer supported by > upstream, and is substantially different from the puppet patches > provided for later versions. Even if it was on the list, we wouldn't be > able to update it since the recent security fixes have rewritten large > parts of code. > > If migrating to a later LTS release isn't possible, I suggest perhaps > using the upstream packages available from Puppet Labs. It's scheduled for next month, but that was based on the assumption that security patches were still being supplied for all of the installed software. It is notably complicated by the property that configuration files from Puppet 0.25 (from Lucid) and 2.7 (from Precise) are neither forward- nor backward- compatible, and thus requires coordinating the upgrade across the puppetmaster server as well as all client machines simultaneously. > I'll also investigate if we can get the puppet version from > Precise into lucid-backports. Perhaps useful to others, but we plan on simply upgrading to a later LTS, so not necessary for our site. - Alex -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to puppet in Ubuntu. https://bugs.launchpad.net/bugs/1192367 Title: No security release provided in Lucid for CVE-2013-3567 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1192367] Re: No security release provided for CVE-2013-3567
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-3567 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to puppet in Ubuntu. https://bugs.launchpad.net/bugs/1192367 Title: No security release provided for CVE-2013-3567 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1192367] [NEW] No security release provided for CVE-2013-3567
Public bug reported: Lucid's version of puppet is listed as "ignored (reached end-of-life)" on the CVE tracking page for CVE-2013-3567 [1]. However, Ubuntu Lucid has not reached end-of-life for the server release -- indeed, `apt-cache show puppet` shows "Supported: 5y". The Ubuntu wiki[2] states that Ubuntu Server LTS supports "security updates and select bug fixes (5 years) -- This is defined as the union of the server-ship and supported- server seeds." Checking the seed file[3], I find that puppet is indeed listed in the server-ship seed. On IRC, I was pointed to ~ubuntu-security/ubuntu-cve-tracker/lucid- supported.txt as the master list of supported packages. How is this list generated, if not as documented under Ubuntu's support policies? I also note that the header line in that file is misleading or incorrect, and should probably read "...are unsupported starting May 9, 2013" if that is the intent. Regardless, either the Lucid release of puppet should gain a security release for CVE-2013-3567, or Ubuntu should update their documentation in numerous places as to what packages are considered "supported" as part of Lucid server LTS. [1] http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-3567.html [2] https://wiki.ubuntu.com/SeedManagement#Maintenance_Period [3] http://people.canonical.com/~ubuntu-archive/germinate-output/ubuntu.lucid/server-ship.seed [4] http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/lucid-supported.txt ** Affects: puppet (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to puppet in Ubuntu. https://bugs.launchpad.net/bugs/1192367 Title: No security release provided for CVE-2013-3567 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/1192367/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 423252] Re: NSS using LDAP+SSL breaks setuid applications like su, sudo, apache2 suexec, and atd
I can confirm that the "use nscd" workaround no longer works in the current Precise beta. This will cause anyone updating from the current LTS to the forthcoming LTS to be unable to run su, sudo, apache2 suexec, and atd from LDAP accounts. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to libnss-ldap in Ubuntu. https://bugs.launchpad.net/bugs/423252 Title: NSS using LDAP+SSL breaks setuid applications like su, sudo, apache2 suexec, and atd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-release-notes/+bug/423252/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs