Public bug reported:
1. What is the problem
On Questing, pollinate fails because it is unable to read from /tmp
On an Azure VM this was first noticed with this AppArmor denied log:
'Jul 19 21:42:00 alan-questing-base-qmnqdpkjhr kernel: audit: type=1400
audit(1752961320.498:173): apparmor="DENIED
walinuxagent cannot be updated to depend on it without
an MIR.
The upstream fix was still taken (https://code.launchpad.net/~aleksa-
svitlica/ubuntu/+source/walinuxagent/+git/walinuxagent/+merge/483698)
because it includes a stub implementation which means the package builds
and the agent runs
so in Ubuntu installation i only added /, swap area and /home. I
tried many other things, but none worked. I would really appreciate your
help.
Regards,
Aleksa Prtenjaca
ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: ubiquity 18.04.14.6
ProcVersionSignature: Ubuntu 4.15.0-29.31-generic 4.15.18
https://github.com/shadow-maint/shadow/pull/99 includes the
allow_setgroups/deny_setgroups feature that we discussed earlier.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1729357
Title:
unprivilege
** Bug watch added: bugzilla.opensuse.org/ #1081294
https://bugzilla.opensuse.org/show_bug.cgi?id=1081294
** Changed in: shadow (openSUSE)
Importance: Undecided => Unknown
** Changed in: shadow (openSUSE)
Status: New => Unknown
** Changed in: shadow (openSUSE)
Remote watch: None =>
CVE-2018-7169 is assigned for this issue.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7169
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1729357
Title:
unprivileged user can d
** Also affects: shadow (openSUSE)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1729357
Title:
unprivileged user can drop supplementary groups
To manage
https://github.com/shadow-maint/shadow/pull/97 is my proposed patch. It
currently only deals with the immediate security issue of allowing users
that don't have
% echo "$(whoami):$(id -g):1" >> /etc/setgid
... set up. I've tested this with a couple of different setups and it
appears to preserve
u want me to change the credits at all? It's your call.
> Aleksa, thanks for asking for a CVE? How did you go about this? This is
> new territory to me.
You just submit the online form at https://cveform.mitre.org/. You can also go
through the project if the project is registered wi
ner
wrote:
> On Thu, Feb 15, 2018 at 11:29:03AM -, Aleksa Sarai wrote:
>> I've just sent a request for a CVE. I'm working on the patch now. My
>
> I assume the CVE will at least be correctly attributed to Craig.
>
> Christian
>
> --
> You received this bug
I've just sent a request for a CVE. I'm working on the patch now. My
current plan is that allow_setgroups will be the default for all
mappings that are present in /etc/subgid -- but any "implicit" mappings
(like mapping your own group) will be deny_setgroups by default (because
that's the biggest s
I had a preliminary patch written, but it was getting quite complicated
(shadow's codebase is much more complicated than I expected -- and the
/etc/subgid parsing code is intertwined with the parsing code for all of
the other /etc/... files). I am working on it though.
I've also email the SUSE Sec
Serge: I will submit a patch later today. However, I just thought that
it's probably better that "allow_setgroups" should be "ignore_setgroups"
and we retain the current behaviour (we don't write anything to
/proc/$pid/setgroups) -- which allows a user (or runtime) to explicitly
disable setgroups e
Oh, and we should definitely get a CVE assigned IMO.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1729357
Title:
unprivileged user can drop supplementary groups
To manage notifications about this
> Thanks for replying Eric, but I'm having trouble reproducing what you've
> posted. I can't write the gid map until I've written deny to
> /prod/$pid/setgroups, not the other way around. There might be some nuance
> I've missed.
Yes, this is a security feature. setgroups must be written to *befor
I don't know how to do the Kernel Bisection...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1334230
Title:
[Asus X550VC] Fn+F2 wifi on/off don't work
To manage notifications about this bug go to:
Hi Joseph!
I tested the lastest kernel (3.16.0-031600rc2-generic) and bug exists. I
added tag and i marked this bug as "Confirmed".
** Tags added: kernel-bug-exists-upstream
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you a
ubuntu3.2
Architecture: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: aleksa 2480 F pulseaudio
/dev/snd/pcmC0D0p: aleksa 2480 F...m pulseaudio
CurrentDesktop: Unity
Date: Wed Jun 25 12:52:14 2014
EcryptfsInUse: Yes
InstallationDate: Installed on 2014-05-31 (24
Hi! I have the same problem with Fn+F2 button combination. I updated the
BIOS, and the new relese says that "Disable combo WLAN card L0S". I
don't know did that disable Fn+F2 conbination or what, but i get wifi
led indicator on.
So, to fix led, enable asus-nb-wmi kernel modul, and tray 4th step of
19 matches
Mail list logo