esm security updates not reported by apt update-notifier

Bug #1881632 reported by Chad Smith on 2020-06-01
266
This bug affects 2 people
Affects Status Importance Assigned to Milestone
update-notifier (Ubuntu)
Undecided
Andreas Hasenack
Trusty
Undecided
Andreas Hasenack

Bug Description

[Impact]
ESM-related Security pocket packages are not reported being classified as security due to a rename in the backend apt suites from esm-security -> esm-infra-security and esm-apps-security.

[Test Case]
* Launch a trusty lxd. For example:
lxc launch ubuntu-daily:trusty trusty

* Update it to the latest publicly available updates:
sudo apt update && sudo apt dist-upgrade -y

* Make sure you have the latest ubuntu-advantage-tools:
sudo apt install ubuntu-advantage-tools

* Run the script that displays the motd bit about available updates:
sudo /usr/lib/update-notifier/apt-check --human-readable

* The output should be something like this, signaling there are only ESM updates available:
"""
UA Infrastructure Extended Security Maintenance (ESM) is not enabled.

0 updates can be installed immediately.
0 of these updates are security updates.

Enable UA Infrastructure ESM to receive 88 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status
"""

* Obtain an UA token for free at https://ubuntu.com/advantage

* Run attach:
sudo ua attach <token-obtained-in-previous-step>

* Confirm that esm-infra was enabled:
sudo ua status

* Run this command again to display the motd banner output about available updates:
sudo /usr/lib/update-notifier/apt-check --human-readable

* You should get something like this without the fix for this bug:
"""
UA Infrastructure Extended Security Maintenance (ESM) is enabled.

89 updates can be installed immediately.
89 of these updates are provided through UA Infrastructure ESM.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
"""

* In the output above, which is without the fix, note how none of the available updates are flagged as security

* With the updated update-notifier package, the security updates count correctly includes the ESM security updates:
"""
UA Infrastructure Extended Security Maintenance (ESM) is enabled.

88 updates can be installed immediately.
88 of these updates are provided through UA Infrastructure ESM.
85 of these updates are security updates.
To see these additional updates run: apt list --upgradable
"""

[Regression Potential]
The fix is replacing the old incorrect name (<distro>-security) of the ESM security pocket with the correct one (<distro>-infra-security). The old name came from the old ubuntu-advantage-tools bash client, version 10. If this name remains incorrect, the security update coming from ESM won't be counted, which is exactly this bug. So the regression potential in this one liner is that it remains uncounted.

[Other Info]
Instead of fixing the pocket's name, we could have *added* a new pocket with the current correct name, since the server part of ESM responds to both trusty-security and trusyt-infra-security (with origin UbuntuESM).

The reasons we didn't do that are:
- only the old bash client (version 10) used the old pocket name, and it's not available for trusty anymore (unless you go to https://launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+publishinghistory and fetch it)
- there was a concern about potentially counting updates twice, if both trusty-security and trusty-infra-security were enabled at the same time
- the upgrade from the bash client (v10) to the current client DOES NOT change the pocket name in the sources.list snippet for ESM, so in that brief moment after an upgrade and before a reattach, the count would be zero just like in this bug. HOWEVER, it's a known process that after upgrading from the bash client to the current one, the machine has to be attached again. See the last paragraph of the description in https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1832757, which is when the non-bash client was SRUed, reproduced below:
"""
On an upgrade, existing users of trusty esm are expected to run "sudo ua attach [<token>]", although not doing it won't disable their existing ESM access. The new ua tool just won't recognize esm as being active in its "ua status" output until the attach operation is complete. The same applies to livepatch, if it was enabled before.
"""
The process of attaching will rewrite the pocket name in the local sources.list file snippet from trusty-security to trusty-infra-security.

Finally, this update is for trusty only. Xenial doesn't have ESM yet, and updating update-notifier there would be an useless download for users, with a regression risk for no benefit.

[Original Description]

ESM-related Security pocket packages are not reported being classified as security due to a rename in the backend apt suites from esm-security -> esm-infra-security and esm-apps-security.

The customer issue reported catches the symptom well:

"""

I believe there's a problem with "apt_check.py" in the "update-notifier-common" package when using "ua". I have enabled "ua" via "ua attach" and yet "apt-check" shows updates, but does not specify they are security updates, even though they are:
mrussell@deputy:~$ /usr/lib/update-notifier/apt-check --human-readable
UA Infrastructure Extended Security Maintenance (ESM) is enabled.

8 updates can be installed immediately.
8 of these updates are provided through UA Infrastructure ESM.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable

Note, these are the packages:
mrussell@deputy:~$ apt list --upgradable
Listing... Done
apt/trusty-infra-security 1.0.1ubuntu2.24+esm1 amd64 [upgradable
from: 1.0.1ubuntu2.24]
apt-transport-https/trusty-infra-security 1.0.1ubuntu2.24+esm1 amd64 [upgradable from: 1.0.1ubuntu2.24]
apt-utils/trusty-infra-security 1.0.1ubuntu2.24+esm1 amd64 [upgradable from: 1.0.1ubuntu2.24]
libapt-inst1.5/trusty-infra-security 1.0.1ubuntu2.24+esm1 amd64 [upgradable from: 1.0.1ubuntu2.24]
libapt-pkg4.12/trusty-infra-security 1.0.1ubuntu2.24+esm1 amd64 [upgradable from: 1.0.1ubuntu2.24]
libjson-c2/trusty-infra-security 0.11-3ubuntu1.2+esm3 amd64 [upgradable from: 0.11-3ubuntu1.2+esm2]
libjson0/trusty-infra-security 0.11-3ubuntu1.2+esm3 amd64 [upgradable from: 0.11-3ubuntu1.2+esm2]

If I change "isSecurityUpgrade()" to also include this
value in "security_pockets": ("UbuntuESM", "%s-infra-security" % DISTRO),
then, the output is correct:
mrussell@deputy:~$ /usr/lib/update-notifier/apt-check --human-readable
UA Infrastructure Extended Security Maintenance (ESM) is enabled.

8 updates can be installed immediately.
8 of these updates are provided through UA Infrastructure ESM.
8 of these updates are security updates.
To see these additional updates run: apt list --upgradable
"""

Related branches

Chad Smith (chad.smith) wrote :

Patch suggestion to ensure both ESM Apps and ESM Infra security pockets are properly classified as security type updates

ESM infra pocket: esm-infra-security
ESM apps pocket: esm-apps-security

Chad Smith (chad.smith) on 2020-06-01
information type: Public → Private Security
Chad Smith (chad.smith) on 2020-06-01
information type: Private Security → Public Security
tags: added: patch
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in update-notifier (Ubuntu):
status: New → Confirmed
Dimitri John Ledkov (xnox) wrote :

I guess this needs to go all the way back to trusty, right?

tags: added: rls-gg-incoming
Mark Morlino (markmorlino) wrote :

yes, all the way back to trusty.

Mark Morlino (markmorlino) wrote :

I can upload the fix to trusty ESM. Should the other releases go to the -security or the -updates pocket?

Julian Andres Klode (juliank) wrote :

Patch looks good to me, does it need sponsoring?

We released other ESM enablement fixes via -updates, so this probably does not need pushing via security.

Mark Morlino (markmorlino) wrote :

yes, needs sponsoring.

And actually, it looks like there have also been a few other updates to update-notifier that went to -updates for trusty even after standard support ended. They appear to have been similarly dealing with how it reports ESM updates. Perhaps I was wrong in my previous comment and it makes more sense to publish this in -updates for trusty instead of trusty/esm?

Andreas Hasenack (ahasenack) wrote :

Note that this bit needs to be ESM_ORIGINS, not esm_origins:

@@ -58,7 +61,7 @@ def isSecurityUpgrade(ver):
 def isESMUpgrade(ver):
     " check if the given version is a security update (or masks one) "
     for (file, index) in ver.file_list:
- if file.origin == "UbuntuESM" and file.archive.startswith(DISTRO):
+ if file.origin in esm_origins and file.archive.startswith(DISTRO):
             return True
     return False

Andreas Hasenack (ahasenack) wrote :

There are other ESM changes done to the trusty package which have never been SRUed to the later ubuntu releases :/

Changed in update-notifier (Ubuntu):
assignee: nobody → Andreas Hasenack (ahasenack)
status: Confirmed → In Progress
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package update-notifier - 3.192.32

---------------
update-notifier (3.192.32) groovy; urgency=medium

  [ Chad Smith ]
  * data/apt_check.py: Update ESM security pockets names (LP: #1881632)
    - the UbuntuESM pocket was renamed from <distro>-security to
      <distro>-infra-security
    - new origin UbuntuESMApps, with a corresponding pocket of
      <distro>-apps-security

 -- Andreas Hasenack <email address hidden> Fri, 12 Jun 2020 11:21:25 -0300

Changed in update-notifier (Ubuntu):
status: In Progress → Fix Released
description: updated
description: updated
Changed in update-notifier (Ubuntu Trusty):
status: New → In Progress
assignee: nobody → Andreas Hasenack (ahasenack)
Andreas Hasenack (ahasenack) wrote :

By checking an update against ESM_ORIGINS, the current patch is aggregating esm security updates for both infra and apps, but the output summary at the end is explicit about infra:

"""
3 of these updates are provided through UA Infrastructure ESM.
"""

We should either count them separately, and issue separate sentences, or, as I would prefer, just remove "Infrastructure" from the sentence above. That avoids increasing the MOTD size by one line.

description: updated
description: updated
description: updated
Andreas Hasenack (ahasenack) wrote :

I uploaded the fixed package to the SRU queue.

To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers