<div dir="ltr">Hi Tyler,<div><br></div><div>thanks for the changes. Now, I have around 109 fails.</div><div><br></div><div><div>According to the scripts, if a CVE has one of the following statuses:</div><div><ul><li>needed<br></li><li>ignored<br></li><li>deferred<br></li><li>pending</li></ul></div><div>it is parsed as "vulnerable" status. The oval generated for "vulnerable" CVEs is: "check if the package exist". <b>It doesn't check any version</b>. This may make sense for some packages, but I think it is not possible to have 109 fails in an updated host.</div><div><br></div><div>What mean those statuses?. </div><div><br></div><div>I attached a file with the list of cve files that the Ubuntu Security Team should review.</div><div><br></div><div><div>OVAL is a great tool and the Ubuntu process to generate the oval checks is almost ready. I think it just need a little review and be very careful during the process of assign a status to the cve file. This will be very useful for the community.</div></div><div><br></div><div>Thanks.</div><div>Regards.</div></div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Jul 5, 2017 at 6:02 PM, Tyler Hicks <span dir="ltr"><<a href="mailto:tyhicks@canonical.com" target="_blank">tyhicks@canonical.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On 07/05/2017 10:30 AM, Jesus Linares wrote:<br>
> Hi Tyler,<br>
><br>
>     The Ubuntu Security Team generates that file during CVE triage of<br>
>     newly assigned CVEs.<br>
><br>
><br>
> that is a manual process, right?.<br>
<br>
</span>Yes, it is manual.<br>
<span class=""><br>
><br>
>     Because all versions are affected. If the status is 'needed', it means<br>
>     that the Ubuntu Security team has not produced security updates that fix<br>
>     the CVE. Therefore, all systems with the xfsprogs deb package installed<br>
>     are affected.<br>
><br>
><br>
</span>> So, right now, all systems with /xfsprogs /are vulnerable?. The cve was<br>
<span class="">> in 2012, it is not possible...<br>
><br>
> The description says that only affects to versions before 3.2.4. I think<br>
> you just need to update the<br>
> file: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
> changing the line:<br>
><br>
>     xenial_xfsprogs: needed<br>
><br>
> to<br>
><br>
>     xenial_xfsprogs: released (version?)<br>
><br>
><br>
</span>> /parse_package_status /function for /needed<br>
> /status: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/generate-oval#L149" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/generate-oval#L149</a><br>
<span class="">><br>
> If that line has the version, the python script will generate the proper<br>
> oval file.<br>
<br>
</span>I thought that you were saying that, in general, a 'needed' status<br>
without a version number would generate problematic OVAL data. Now I<br>
understand that you were saying that CVE-2012-2150 needed to be<br>
retriaged. I've done that here:<br>
<br>
 <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/revision/12855" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/revision/12855</a><br>
<br>
I've also committed the oval_lib.py change that you suggested:<br>
<br>
 <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/revision/12856" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/revision/12856</a><br>
<br>
Thanks for debugging the issue and providing a fix! Let us know if you<br>
find any other issues in the generation of OVAL data.<br>
<br>
Tyler<br>
<span class=""><br>
><br>
><br>
> I think I can't help more here, because the error is in the input files,<br>
> not in the scripts.<br>
><br>
> What do you think?.<br>
> Thanks.<br>
> Regards.<br>
><br>
><br>
><br>
> On Wed, Jul 5, 2017 at 5:12 PM, Tyler Hicks <<a href="mailto:tyhicks@canonical.com">tyhicks@canonical.com</a><br>
</span><div><div class="h5">> <mailto:<a href="mailto:tyhicks@canonical.com">tyhicks@canonical.com</a>><wbr>> wrote:<br>
><br>
>     On 07/05/2017 09:57 AM, Jesus Linares wrote:<br>
>     > Hi,<br>
>     ><br>
>     > it seems there are more errors. For example, I get a "fail" for the<br>
>     > check: CVE-2012-2150.<br>
>     ><br>
>     > If we review the oval file for that check:<br>
>     ><br>
>     >     <definition class="vulnerability"<br>
>     >     id="oval:com.ubuntu.xenial:<wbr>def:20122150000" version="1"><br>
>     >         ...<br>
>     >     <criteria><br>
>     >     <extend_definition definition_ref="oval:com.<wbr>ubuntu.xenial:def:100"<br>
>     >     comment="Ubuntu 16.04 LTS (xenial) is installed."<br>
>     >     applicability_check="true" /><br>
>     >     <criterion test_ref="oval:com.ubuntu.<wbr>xenial:tst:20122150000"<br>
>     >     comment="The 'xfsprogs' package in xenial is affected and needs<br>
>     >     fixing." /><br>
>     >     </criteria><br>
>     >     </definition><br>
>     >     <linux-def:dpkginfo_test<br>
>     id="oval:com.ubuntu.xenial:<wbr>tst:20122150000"<br>
>     >     version="1" check_existence="at_least_one_<wbr>exists" check="all"<br>
>     >     comment="Does the 'xfsprogs' package exist?"><br>
>     >     <linux-def:object<br>
>     object_ref="oval:com.ubuntu.<wbr>xenial:obj:20122150000"/><br>
>     >     </linux-def:dpkginfo_test><br>
>     >     <linux-def:dpkginfo_object<br>
>     >     id="oval:com.ubuntu.xenial:<wbr>obj:20122150000" version="1"<br>
>     comment="The<br>
>     >     'xfsprogs' package."><br>
>     >     <linux-def:name>xfsprogs</<wbr>linux-def:name><br>
>     >     </linux-def:dpkginfo_object><br>
>     ><br>
>     ><br>
>     > It is checking if the /xfsprogs /package exists. In my machine I have<br>
>     > /xfsprogs 4.3.0+nmu1ubuntu1/ installed. So, the oscap is working<br>
>     > properly. The point is: is my xfsprogs vulnerable?. If we take a look at<br>
>     > the input file to generate the<br>
>     > oval: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a>><br>
>     ><br>
>     >     xfs_metadump in *xfsprogs before 3.2.4* does not properly<br>
>     obfuscate<br>
>     >     file data, which allows remote attackers to obtain sensitive<br>
>     >     information by reading a generated image.<br>
>     ><br>
>     ><br>
>     > The description says: xfsprogs before 3.2.4 and I have the version 4.<br>
>     > Oval is only checking if the package exists, but not its version. The<br>
>     > reason is:<br>
>     ><br>
>     > The function /parse_package_status<br>
>     ><br>
>     (<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/generate-oval#L117" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/generate-oval#L117</a><br>
</div></div>>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/generate-oval#L117" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/generate-oval#L117</a>>)<br>
<span class="">>     /parses<br>
>     > the line:<br>
>     ><br>
>     >   * "xenial_xfsprogs: needed"<br>
>     >     of<br>
>     <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a>><br>
>     >     to<br>
>     >   * "{'note': "The 'xfsprogs' package in trusty is affected and needs<br>
>     >     fixing.", 'status': 'vulnerable'}".<br>
>     >   * That means check only the package, not the version, because<br>
>     there is<br>
>     >     no version<br>
>     >     (<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L220" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L220</a><br>
</span>>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L220" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L220</a>>)<br>
<span class="">>     ><br>
>     > If we take a look at other checks:<br>
>     ><br>
>     >   * "xenial_git: released (1:2.7.4-0ubuntu1.1)" of<br>
>     >     <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/retired/CVE-2017-8386" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>retired/CVE-2017-8386</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/retired/CVE-2017-8386" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>retired/CVE-2017-8386</a>><br>
>     >     is parsed to<br>
>     >   * {'fix-version': '1:2.7.4-0ubuntu1.1', 'note': "The 'git'<br>
>     package in<br>
>     >     xenial was vulnerable but has been fixed (note:<br>
>     >     '1:2.7.4-0ubuntu1.1').", 'status': 'fixed'}<br>
>     >   * Here the version is checked.<br>
>     ><br>
>     > So, my final questions are:<br>
>     ><br>
>     >   * Who generates this<br>
>     >     file<br>
>     <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
</span>>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a>>?<br>
<span class="">><br>
>     The Ubuntu Security Team generates that file during CVE triage of newly<br>
>     assigned CVEs.<br>
><br>
>     >   * Why there is no a specific version?<br>
><br>
>     Because all versions are affected. If the status is 'needed', it means<br>
>     that the Ubuntu Security team has not produced security updates that fix<br>
>     the CVE. Therefore, all systems with the xfsprogs deb package installed<br>
>     are affected.<br>
><br>
>     Do you know how that can be conveyed in the OVAL file?<br>
><br>
>     ><br>
>     > There are 109 fails after fix the issue that I commented in the previous<br>
>     > email and my OS is updated, so I suspect it is happening the same in the<br>
>     > rest of checks.<br>
><br>
>     Thanks for tracking down the issue you described in your previous email.<br>
>     I'll hold off on committing that change until you're able to get to the<br>
>     bottom of the issue you describe in this email.<br>
><br>
>     Tyler<br>
><br>
>     ><br>
>     > Thanks.<br>
>     > Regards.<br>
>     ><br>
>     ><br>
>     ><br>
>     ><br>
>     > On Wed, Jul 5, 2017 at 3:19 PM, Jesus Linares <<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>><br>
</span><span class="">>     > <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>>>> wrote:<br>
>     ><br>
>     >     Hi,<br>
>     ><br>
>     >     finally I found the<br>
>     >     issue: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a>><br>
>     >     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a>>><br>
>     ><br>
>     >     In that line there is an if-else. The /else /has the logic to add<br>
>     >     the "negate" attribute, but the /if/ doesn't have it.<br>
>     ><br>
>     >     It is neccesary to replace the lines 111 to 113, for:<br>
>     ><br>
>     >         negation_attribute = 'negate = "true" ' if 'negate' in<br>
>     >         test_refs[0] and test_refs[0]['negate'] else ''<br>
>     >         mapping['criteria'] = '<criterion test_ref="{0}" comment="{1}"<br>
>     >         {2}/>'.format(test_refs[0]['<wbr>id'],<br>
>     >         escape(test_refs[0]['comment']<wbr>), negation_attribute)<br>
>     ><br>
>     ><br>
>     >     In this way, the scan reports 109 fails instead of 1750. Now, I'm<br>
>     >     going to review these 109 fails.<br>
>     ><br>
>     >     Please, update the script ASAP.<br>
>     ><br>
>     >     Thanks.<br>
>     >     Regards.<br>
>     ><br>
>     ><br>
>     >     On Tue, Jul 4, 2017 at 7:50 PM, Jesus Linares <<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>><br>
</span><span class="">>     >     <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>>>> wrote:<br>
>     ><br>
>     >         Hi,<br>
>     ><br>
>     >         I'm testing again the oval files for Xenial 16.04 (updated) and<br>
>     >         OpenSCAP reports 1750 /fails/... Something weird is<br>
>     happening. I<br>
>     >         will check out this issue again, but I would appreciate any help.<br>
>     ><br>
>     >         Here an example:<br>
>     ><br>
>     >             <linux-def:dpkginfo_test<br>
>     >             id="oval:com.ubuntu.xenial:<wbr>tst:20176919000" version="1"<br>
>     >             check_existence="any_exist" check="all" comment="*Returns<br>
>     >             true whether or not the 'drupal7' package exists.*"><br>
>     >             <linux-def:object<br>
>     >             object_ref="oval:com.ubuntu.<wbr>xenial:obj:20076752000"/><br>
>     >             </linux-def:dpkginfo_test><br>
>     >             <linux-def:dpkginfo_object<br>
>     >             id="oval:com.ubuntu.xenial:<wbr>obj:20076752000" version="1"<br>
>     >             comment="The 'drupal7' package."><br>
>     >             <linux-def:name>drupal7</<wbr>linux-def:name><br>
>     >             </linux-def:dpkginfo_object><br>
>     ><br>
>     ><br>
>     >         If the check return always true, it doesn't make sense...<br>
>     ><br>
>     >         Thanks.<br>
>     >         Regards.<br>
>     ><br>
>     ><br>
>     ><br>
>     >         On Wed, Nov 2, 2016 at 11:29 AM, Jesus Linares <<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>><br>
</span><span class="">>     >         <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>>>> wrote:<br>
>     ><br>
>     >             Hi,<br>
>     ><br>
>     >             this is from the specific<br>
>     >             CVE:<br>
>     xenial_libapache-mod-jk:not-<wbr>affected(1:1.2.40+svn150520-1)<br>
>     ><br>
>     >             So, if it is not affected for xenial, the check should<br>
>     >             include the "negate" in order to return that is not a<br>
>     >             vulnerability, right?.<br>
>     ><br>
>     >             Regards.<br>
>     ><br>
>     ><br>
>     >             On Fri, Oct 28, 2016 at 9:10 PM, Seth Arnold<br>
>     >             <<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.com</a> <mailto:<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.<wbr>com</a>><br>
</span><span class="">>     >             <mailto:<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.<wbr>com</a> <mailto:<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.<wbr>com</a>>>> wrote:<br>
>     ><br>
>     >                 On Fri, Oct 28, 2016 at 11:19:21AM +0200, Jesus Linares<br>
>     >                 wrote:<br>
>     >                 > I think this test should have the "negate" due to the comment "While<br>
>     >                 > related to the CVE in some way, the 'libapache-mod-jk'<br>
>     >                 package in* xenial<br>
>     >                 > is not affected*". So, maybe the input of the script<br>
>     >                 is wrong?. Where is<br>
>     >                 > the input?.<br>
>     ><br>
>     >                 The input is from the ubuntu-cve-tracker bzr tree;<br>
>     ><br>
>     >                 <a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a> <<a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a>><br>
>     >                 <<a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a> <<a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a>>><br>
>     ><br>
>     >                 In the case of this specific CVE:<br>
>     ><br>
>     >                 <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a>><br>
>     >                 <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a><br>
>     <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a>>><br>
>     ><br>
>     >                 Thanks<br>
>     ><br>
>     >                 --<br>
>     >                 ubuntu-hardened mailing list<br>
>     >                 <a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.ubuntu.<wbr>com</a><br>
>     <mailto:<a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.<wbr>ubuntu.com</a>><br>
</span>>     >                 <mailto:<a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.<wbr>ubuntu.com</a><br>
<div class="HOEnZb"><div class="h5">>     <mailto:<a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.<wbr>ubuntu.com</a>>><br>
>     ><br>
>      <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a><br>
>     <<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a>><br>
>     <<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a><br>
>     <<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a>>><br>
>     ><br>
>     ><br>
>     ><br>
>     ><br>
>     >             --<br>
>     >             *Jesus Linares*<br>
>     >             /IT Security Engineer/<br>
>     >             /<br>
>     >             /<br>
>     ><br>
>     ><br>
>     ><br>
>     ><br>
>     >         --<br>
>     >         *Jesus Linares*<br>
>     >         /IT Security Engineer/<br>
>     >         /<br>
>     >         /<br>
>     ><br>
>     ><br>
>     ><br>
>     ><br>
>     >     --<br>
>     >     *Jesus Linares*<br>
>     >     /IT Security Engineer/<br>
>     >     /<br>
>     >     /<br>
>     ><br>
>     ><br>
>     ><br>
>     ><br>
>     > --<br>
>     > *Jesus Linares*<br>
>     > /IT Security Engineer/<br>
>     > /<br>
>     > /<br>
>     ><br>
>     ><br>
><br>
><br>
><br>
><br>
><br>
> --<br>
> *Jesus Linares*<br>
> /IT Security Engineer/<br>
> /<br>
> /<br>
<br>
<br>
</div></div></blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><b style="font-size:12.8px"><font color="#0b5394">Jesus Linares</font></b><div style="font-size:12.8px"><i><font color="#999999">IT Security Engineer</font></i></div><div style="font-size:12.8px"><i><font color="#999999"><img src="https://docs.google.com/uc?export=download&id=0Bx75KsPzHxO_THFpRzBONGpoeWs&revid=0Bx75KsPzHxO_aG5WOW1OU3p3V3JOVUczVDlPViszMTdGZUtrPQ" width="96" height="16"><br></font></i></div></div></div>
</div>