Activity log for bug #1026852

Date Who What changed Old value New value Message
2012-07-20 00:19:46 Tyler Hicks bug added bug
2012-07-20 00:23:14 Tyler Hicks bug added subscriber MIR approval team
2012-07-20 00:58:43 Tyler Hicks description This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest are: - auditd - libaudit0 - libaudit-dev - python-audit The binary pacakges that may remain in universe are: - audispd-plugins - system-config-audit Availability: - Available in universe for all arches Rationale: - Discussed as part of the P and Q security catch all blueprints + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all - libaudit0 is a build dependency of the Debian cron package + https://launchpad.net/bugs/878155 - The audit log can already used by AppArmor + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security: - One CVE (CVE-2008-1628) in the project's history - Note that CVEs have been assigned for the kernel audit subsystem, but those are unrelated to the audit userspace code - Security risk involved since auditd is a daemon that runs as root - auditd can open up a port and listen for audit messages from remote machines + The default auditd.conf is *not* configured to open a port + auditd doesn't create a socket unless tcp_listen_port is set in auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c) + The upstream build system does not allow disabling of the networking code - The audispd-plugins binary package contains functionality to send audit messages to remote machines but a main inclusion is not being requested for audispd-plugins Quality Assurance: - Basic audit logging works immediately after auditd package installation - The upstream maintainer is active on the mailing list + https://www.redhat.com/mailman/listinfo/linux-audit - The lastest upstream release was on March 23, 2012 - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit source package + https://bugs.launchpad.net/ubuntu/+source/audit - 5 "normal" bugs opened against the Debian audit source package + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit - 'make check' tests are enabled in the build - debian/watch exists UI Standards: - The only end-user application is in the system-config-audit binary package, which is not included in this MIR Dependencies: - Two build dependencies are not in main + libprelude-dev binary and source package is in universe + libev-dev binary and source package is in universe + TODO: More investigation is currently needed to resolve this problem - All relevant binary dependencies are in in main + check-mir points out menu and chkconfig, but they are dependencies of system-config-audit, which is not included in this MIR Standards Compliance: - No lintian errors - 9 overridden lintian warnings due to non-standard file/dir permissions because config and log files are intentionally installed with restrictive file permissions due to the security-related nature of the package (see debian/auditd.lintian-overrides) Maintenance: - This is a relatively simple package that seems to be well maintained upstream and in Debian - Should not require a dedicated maintainer in Ubuntu This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest are:  - auditd  - libaudit0  - libaudit-dev  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins  - system-config-audit Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root + Implementing privilege dropping would not be trivial: http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - Two build dependencies are not in main    + libprelude-dev binary and source package is in universe    + libev-dev binary and source package is in universe    + TODO: More investigation is currently needed to resolve this problem  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu
2012-07-20 01:42:48 Tyler Hicks summary [MIR] audit [MIR] audit (pulls in libprelude and maybe libev)
2012-07-20 01:43:14 Tyler Hicks bug task added libprelude (Ubuntu)
2012-07-20 01:43:47 Tyler Hicks bug task added libev (Ubuntu)
2012-07-20 01:44:15 Tyler Hicks description This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest are:  - auditd  - libaudit0  - libaudit-dev  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins  - system-config-audit Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root + Implementing privilege dropping would not be trivial: http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - Two build dependencies are not in main    + libprelude-dev binary and source package is in universe    + libev-dev binary and source package is in universe    + TODO: More investigation is currently needed to resolve this problem  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest are:  - auditd  - libaudit0  - libaudit-dev  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins  - system-config-audit Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - Two build dependencies are not in main    + libprelude-dev binary and source package is in universe    + libev-dev binary and source package is in universe  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu
2012-07-20 19:53:17 Tyler Hicks removed subscriber MIR approval team
2012-07-20 19:53:35 Tyler Hicks libev (Ubuntu): status New Invalid
2012-07-20 19:53:38 Tyler Hicks libprelude (Ubuntu): status New Invalid
2012-11-26 20:51:25 Tyler Hicks attachment added audit_1.7.18-1ubuntu2.debdiff https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1026852/+attachment/3444387/+files/audit_1.7.18-1ubuntu2.debdiff
2012-11-26 20:51:37 Tyler Hicks summary [MIR] audit (pulls in libprelude and maybe libev) [MIR] audit (pulls in libprelude)
2012-11-26 20:56:26 Tyler Hicks description This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest are:  - auditd  - libaudit0  - libaudit-dev  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins  - system-config-audit Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - Two build dependencies are not in main    + libprelude-dev binary and source package is in universe    + libev-dev binary and source package is in universe  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest (some of which are created by the attached debdiff for the audit package) are:  - auditd-common - auditd-light  - libaudit0  - libaudit-dev  - python-audit The binary pacakges that may remain in universe are: - auditd  - audispd-plugins  - system-config-audit Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - One build dependency is not in main    + libprelude-dev binary and source package is in universe + NOTE: libev-dev is a current Build-Dependency, but it is not required because audit contains its own libev. The attached debdiff removes it from audit's Build-Dependency list.  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu
2012-11-27 00:16:26 Ubuntu Foundations Team Bug Bot tags patch
2012-11-27 00:16:33 Ubuntu Foundations Team Bug Bot bug added subscriber Ubuntu Sponsors Team
2012-12-01 15:09:51 Laurent Bigonville bug added subscriber Laurent Bigonville
2012-12-05 15:51:59 Marc Deslauriers removed subscriber Ubuntu Sponsors Team
2013-02-06 17:22:28 Tim Gardner bug added subscriber Tim Gardner
2013-02-06 23:00:53 Tyler Hicks attachment added audit_2.2.2-1ubuntu2.debdiff https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1026852/+attachment/3517835/+files/audit_2.2.2-1ubuntu2.debdiff
2013-02-07 00:23:03 Tyler Hicks description This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest (some of which are created by the attached debdiff for the audit package) are:  - auditd-common - auditd-light  - libaudit0  - libaudit-dev  - python-audit The binary pacakges that may remain in universe are: - auditd  - audispd-plugins  - system-config-audit Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - One build dependency is not in main    + libprelude-dev binary and source package is in universe + NOTE: libev-dev is a current Build-Dependency, but it is not required because audit contains its own libev. The attached debdiff removes it from audit's Build-Dependency list.  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest (some of which are created by the attached debdiff for the audit package) are:  - auditd - libaudit-common  - libaudit-dev - libaudit1 - libauparse-dev - libauparse0  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already be used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files - linux-tools perf depends on libaudit-dev Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines + NOTE: This is no longer true as of auditd 1:2.2.2-1ubuntu2, which disabled the network listener support    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - One build dependency is not in main    + libprelude-dev binary and source package is in universe    + NOTE: libev-dev is a current Build-Dependency, but it is not required because      audit contains its own libev. The attached debdiff removes it from audit's      Build-Dependency list.  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu
2013-02-07 00:31:28 Tyler Hicks description This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest (some of which are created by the attached debdiff for the audit package) are:  - auditd - libaudit-common  - libaudit-dev - libaudit1 - libauparse-dev - libauparse0  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already be used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files - linux-tools perf depends on libaudit-dev Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines + NOTE: This is no longer true as of auditd 1:2.2.2-1ubuntu2, which disabled the network listener support    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 4 "normal" bugs (one linked to a Debian bug) opened against Ubuntu audit    source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 5 "normal" bugs opened against the Debian audit source package    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - One build dependency is not in main    + libprelude-dev binary and source package is in universe    + NOTE: libev-dev is a current Build-Dependency, but it is not required because      audit contains its own libev. The attached debdiff removes it from audit's      Build-Dependency list.  - All relevant binary dependencies are in in main    + check-mir points out menu and chkconfig, but they are dependencies of      system-config-audit, which is not included in this MIR Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu This is a MIR to bring a portion of binary packages built from the audit source package into main. The binary packages of interest (some of which are created by the attached debdiff for the audit package) are:  - auditd  - libaudit-common  - libaudit-dev  - libaudit1  - libauparse-dev  - libauparse0  - python-audit The binary pacakges that may remain in universe are:  - audispd-plugins Availability:  - Available in universe for all arches Rationale:  - Discussed as part of the P and Q security catch all blueprints    + https://blueprints.launchpad.net/ubuntu/+spec/security-p-catch-all    + https://blueprints.launchpad.net/ubuntu/+spec/security-q-catch-all  - libaudit0 is a build dependency of the Debian cron package    + https://launchpad.net/bugs/878155  - The audit log can already be used by AppArmor    + http://wiki.apparmor.net/index.php/AppArmor_Failures#Messages_in_the_Log_files  - linux-tools perf depends on libaudit-dev Security:  - One CVE (CVE-2008-1628) in the project's history  - Note that CVEs have been assigned for the kernel audit subsystem, but those    are unrelated to the audit userspace code  - Security risk involved since auditd is a daemon that runs as root    + Implementing privilege dropping would not be trivial:      http://www.redhat.com/archives/linux-audit/2009-October/msg00011.html  - auditd can open up a port and listen for audit messages from remote machines    + NOTE: This is no longer true as of auditd 1:2.2.2-1ubuntu2, which disabled      the network listener support    + The default auditd.conf is *not* configured to open a port    + auditd doesn't create a socket unless tcp_listen_port is set in      auditd.conf (see auditd_tcp_listen_init() in src/auditd-listen.c)    + The upstream build system does not allow disabling of the networking code  - The audispd-plugins binary package contains functionality to send audit    messages to remote machines but a main inclusion is not being requested for    audispd-plugins Quality Assurance:  - Basic audit logging works immediately after auditd package installation  - The upstream maintainer is active on the mailing list    + https://www.redhat.com/mailman/listinfo/linux-audit  - The lastest upstream release was on March 23, 2012  - 1 "low" bug opened against Ubuntu audit source package    + https://bugs.launchpad.net/ubuntu/+source/audit  - 4 bugs opened against the Debian audit source package + 1 important, 2 minor, 1 wishlist    + http://bugs.debian.org/cgi-bin/pkgreport.cgi?src=audit  - 'make check' tests are enabled in the build  - debian/watch exists UI Standards:  - The only end-user application is in the system-config-audit binary package,    which is not included in this MIR Dependencies:  - One build dependency is not in main    + libprelude-dev binary and source package is in universe  - All external binary dependencies are in in main Standards Compliance:  - No lintian errors  - 9 overridden lintian warnings due to non-standard file/dir permissions    because config and log files are intentionally installed with restrictive    file permissions due to the security-related nature of the package (see    debian/auditd.lintian-overrides) Maintenance:  - This is a relatively simple package that seems to be well maintained    upstream and in Debian  - Should not require a dedicated maintainer in Ubuntu
2013-02-07 00:34:53 Tyler Hicks libprelude (Ubuntu): status Invalid New
2013-02-07 00:35:17 Tyler Hicks bug added subscriber MIR approval team
2013-02-07 00:52:06 Tyler Hicks bug task deleted libev (Ubuntu)
2013-02-07 06:25:15 Launchpad Janitor audit (Ubuntu): status New Fix Released
2013-02-07 17:15:34 Tyler Hicks audit (Ubuntu): status Fix Released New
2013-02-07 20:50:13 Jamie Strandboge audit (Ubuntu): assignee Jamie Strandboge (jdstrand)
2013-02-07 20:50:17 Jamie Strandboge libprelude (Ubuntu): assignee Jamie Strandboge (jdstrand)
2013-02-07 21:10:00 Jamie Strandboge libprelude (Ubuntu): status New Fix Committed
2013-02-07 21:10:00 Jamie Strandboge libprelude (Ubuntu): assignee Jamie Strandboge (jdstrand)
2013-02-07 21:42:32 Jamie Strandboge audit (Ubuntu): status New In Progress
2013-02-07 21:42:32 Jamie Strandboge audit (Ubuntu): assignee Jamie Strandboge (jdstrand) Tyler Hicks (tyhicks)
2013-02-09 02:27:54 Adam Conrad libprelude (Ubuntu): status Fix Committed Fix Released
2013-02-09 03:26:08 Tyler Hicks attachment added audit_2.2.2-1ubuntu3.debdiff https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1026852/+attachment/3521690/+files/audit_2.2.2-1ubuntu3.debdiff
2013-02-09 07:54:12 Launchpad Janitor audit (Ubuntu): status In Progress Fix Released