<div dir="ltr">Hi Tyler,<div><br></div><div>thanks for the changes. Now, I have around 109 fails.</div><div><br></div><div><div>According to the scripts, if a CVE has one of the following statuses:</div><div><ul><li>needed<br></li><li>ignored<br></li><li>deferred<br></li><li>pending</li></ul></div><div>it is parsed as "vulnerable" status. The oval generated for "vulnerable" CVEs is: "check if the package exist". <b>It doesn't check any version</b>. This may make sense for some packages, but I think it is not possible to have 109 fails in an updated host.</div><div><br></div><div>What mean those statuses?. </div><div><br></div><div>I attached a file with the list of cve files that the Ubuntu Security Team should review.</div><div><br></div><div><div>OVAL is a great tool and the Ubuntu process to generate the oval checks is almost ready. I think it just need a little review and be very careful during the process of assign a status to the cve file. This will be very useful for the community.</div></div><div><br></div><div>Thanks.</div><div>Regards.</div></div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Jul 5, 2017 at 6:02 PM, Tyler Hicks <span dir="ltr"><<a href="mailto:tyhicks@canonical.com" target="_blank">tyhicks@canonical.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On 07/05/2017 10:30 AM, Jesus Linares wrote:<br>
> Hi Tyler,<br>
><br>
> The Ubuntu Security Team generates that file during CVE triage of<br>
> newly assigned CVEs.<br>
><br>
><br>
> that is a manual process, right?.<br>
<br>
</span>Yes, it is manual.<br>
<span class=""><br>
><br>
> Because all versions are affected. If the status is 'needed', it means<br>
> that the Ubuntu Security team has not produced security updates that fix<br>
> the CVE. Therefore, all systems with the xfsprogs deb package installed<br>
> are affected.<br>
><br>
><br>
</span>> So, right now, all systems with /xfsprogs /are vulnerable?. The cve was<br>
<span class="">> in 2012, it is not possible...<br>
><br>
> The description says that only affects to versions before 3.2.4. I think<br>
> you just need to update the<br>
> file: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
> changing the line:<br>
><br>
> xenial_xfsprogs: needed<br>
><br>
> to<br>
><br>
> xenial_xfsprogs: released (version?)<br>
><br>
><br>
</span>> /parse_package_status /function for /needed<br>
> /status: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/generate-oval#L149" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/generate-oval#L149</a><br>
<span class="">><br>
> If that line has the version, the python script will generate the proper<br>
> oval file.<br>
<br>
</span>I thought that you were saying that, in general, a 'needed' status<br>
without a version number would generate problematic OVAL data. Now I<br>
understand that you were saying that CVE-2012-2150 needed to be<br>
retriaged. I've done that here:<br>
<br>
<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/revision/12855" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/revision/12855</a><br>
<br>
I've also committed the oval_lib.py change that you suggested:<br>
<br>
<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/revision/12856" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/revision/12856</a><br>
<br>
Thanks for debugging the issue and providing a fix! Let us know if you<br>
find any other issues in the generation of OVAL data.<br>
<br>
Tyler<br>
<span class=""><br>
><br>
><br>
> I think I can't help more here, because the error is in the input files,<br>
> not in the scripts.<br>
><br>
> What do you think?.<br>
> Thanks.<br>
> Regards.<br>
><br>
><br>
><br>
> On Wed, Jul 5, 2017 at 5:12 PM, Tyler Hicks <<a href="mailto:tyhicks@canonical.com">tyhicks@canonical.com</a><br>
</span><div><div class="h5">> <mailto:<a href="mailto:tyhicks@canonical.com">tyhicks@canonical.com</a>><wbr>> wrote:<br>
><br>
> On 07/05/2017 09:57 AM, Jesus Linares wrote:<br>
> > Hi,<br>
> ><br>
> > it seems there are more errors. For example, I get a "fail" for the<br>
> > check: CVE-2012-2150.<br>
> ><br>
> > If we review the oval file for that check:<br>
> ><br>
> > <definition class="vulnerability"<br>
> > id="oval:com.ubuntu.xenial:<wbr>def:20122150000" version="1"><br>
> > ...<br>
> > <criteria><br>
> > <extend_definition definition_ref="oval:com.<wbr>ubuntu.xenial:def:100"<br>
> > comment="Ubuntu 16.04 LTS (xenial) is installed."<br>
> > applicability_check="true" /><br>
> > <criterion test_ref="oval:com.ubuntu.<wbr>xenial:tst:20122150000"<br>
> > comment="The 'xfsprogs' package in xenial is affected and needs<br>
> > fixing." /><br>
> > </criteria><br>
> > </definition><br>
> > <linux-def:dpkginfo_test<br>
> id="oval:com.ubuntu.xenial:<wbr>tst:20122150000"<br>
> > version="1" check_existence="at_least_one_<wbr>exists" check="all"<br>
> > comment="Does the 'xfsprogs' package exist?"><br>
> > <linux-def:object<br>
> object_ref="oval:com.ubuntu.<wbr>xenial:obj:20122150000"/><br>
> > </linux-def:dpkginfo_test><br>
> > <linux-def:dpkginfo_object<br>
> > id="oval:com.ubuntu.xenial:<wbr>obj:20122150000" version="1"<br>
> comment="The<br>
> > 'xfsprogs' package."><br>
> > <linux-def:name>xfsprogs</<wbr>linux-def:name><br>
> > </linux-def:dpkginfo_object><br>
> ><br>
> ><br>
> > It is checking if the /xfsprogs /package exists. In my machine I have<br>
> > /xfsprogs 4.3.0+nmu1ubuntu1/ installed. So, the oscap is working<br>
> > properly. The point is: is my xfsprogs vulnerable?. If we take a look at<br>
> > the input file to generate the<br>
> > oval: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a>><br>
> ><br>
> > xfs_metadump in *xfsprogs before 3.2.4* does not properly<br>
> obfuscate<br>
> > file data, which allows remote attackers to obtain sensitive<br>
> > information by reading a generated image.<br>
> ><br>
> ><br>
> > The description says: xfsprogs before 3.2.4 and I have the version 4.<br>
> > Oval is only checking if the package exists, but not its version. The<br>
> > reason is:<br>
> ><br>
> > The function /parse_package_status<br>
> ><br>
> (<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/generate-oval#L117" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/generate-oval#L117</a><br>
</div></div>> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/generate-oval#L117" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/generate-oval#L117</a>>)<br>
<span class="">> /parses<br>
> > the line:<br>
> ><br>
> > * "xenial_xfsprogs: needed"<br>
> > of<br>
> <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a>><br>
> > to<br>
> > * "{'note': "The 'xfsprogs' package in trusty is affected and needs<br>
> > fixing.", 'status': 'vulnerable'}".<br>
> > * That means check only the package, not the version, because<br>
> there is<br>
> > no version<br>
> > (<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L220" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L220</a><br>
</span>> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L220" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L220</a>>)<br>
<span class="">> ><br>
> > If we take a look at other checks:<br>
> ><br>
> > * "xenial_git: released (1:2.7.4-0ubuntu1.1)" of<br>
> > <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/retired/CVE-2017-8386" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>retired/CVE-2017-8386</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/retired/CVE-2017-8386" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>retired/CVE-2017-8386</a>><br>
> > is parsed to<br>
> > * {'fix-version': '1:2.7.4-0ubuntu1.1', 'note': "The 'git'<br>
> package in<br>
> > xenial was vulnerable but has been fixed (note:<br>
> > '1:2.7.4-0ubuntu1.1').", 'status': 'fixed'}<br>
> > * Here the version is checked.<br>
> ><br>
> > So, my final questions are:<br>
> ><br>
> > * Who generates this<br>
> > file<br>
> <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a><br>
</span>> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/12851/active/CVE-2012-2150" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/12851/<wbr>active/CVE-2012-2150</a>>?<br>
<span class="">><br>
> The Ubuntu Security Team generates that file during CVE triage of newly<br>
> assigned CVEs.<br>
><br>
> > * Why there is no a specific version?<br>
><br>
> Because all versions are affected. If the status is 'needed', it means<br>
> that the Ubuntu Security team has not produced security updates that fix<br>
> the CVE. Therefore, all systems with the xfsprogs deb package installed<br>
> are affected.<br>
><br>
> Do you know how that can be conveyed in the OVAL file?<br>
><br>
> ><br>
> > There are 109 fails after fix the issue that I commented in the previous<br>
> > email and my OS is updated, so I suspect it is happening the same in the<br>
> > rest of checks.<br>
><br>
> Thanks for tracking down the issue you described in your previous email.<br>
> I'll hold off on committing that change until you're able to get to the<br>
> bottom of the issue you describe in this email.<br>
><br>
> Tyler<br>
><br>
> ><br>
> > Thanks.<br>
> > Regards.<br>
> ><br>
> ><br>
> ><br>
> ><br>
> > On Wed, Jul 5, 2017 at 3:19 PM, Jesus Linares <<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>><br>
</span><span class="">> > <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>>>> wrote:<br>
> ><br>
> > Hi,<br>
> ><br>
> > finally I found the<br>
> > issue: <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a>><br>
> > <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/scripts/oval_lib.py#L110" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>scripts/oval_lib.py#L110</a>>><br>
> ><br>
> > In that line there is an if-else. The /else /has the logic to add<br>
> > the "negate" attribute, but the /if/ doesn't have it.<br>
> ><br>
> > It is neccesary to replace the lines 111 to 113, for:<br>
> ><br>
> > negation_attribute = 'negate = "true" ' if 'negate' in<br>
> > test_refs[0] and test_refs[0]['negate'] else ''<br>
> > mapping['criteria'] = '<criterion test_ref="{0}" comment="{1}"<br>
> > {2}/>'.format(test_refs[0]['<wbr>id'],<br>
> > escape(test_refs[0]['comment']<wbr>), negation_attribute)<br>
> ><br>
> ><br>
> > In this way, the scan reports 109 fails instead of 1750. Now, I'm<br>
> > going to review these 109 fails.<br>
> ><br>
> > Please, update the script ASAP.<br>
> ><br>
> > Thanks.<br>
> > Regards.<br>
> ><br>
> ><br>
> > On Tue, Jul 4, 2017 at 7:50 PM, Jesus Linares <<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>><br>
</span><span class="">> > <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>>>> wrote:<br>
> ><br>
> > Hi,<br>
> ><br>
> > I'm testing again the oval files for Xenial 16.04 (updated) and<br>
> > OpenSCAP reports 1750 /fails/... Something weird is<br>
> happening. I<br>
> > will check out this issue again, but I would appreciate any help.<br>
> ><br>
> > Here an example:<br>
> ><br>
> > <linux-def:dpkginfo_test<br>
> > id="oval:com.ubuntu.xenial:<wbr>tst:20176919000" version="1"<br>
> > check_existence="any_exist" check="all" comment="*Returns<br>
> > true whether or not the 'drupal7' package exists.*"><br>
> > <linux-def:object<br>
> > object_ref="oval:com.ubuntu.<wbr>xenial:obj:20076752000"/><br>
> > </linux-def:dpkginfo_test><br>
> > <linux-def:dpkginfo_object<br>
> > id="oval:com.ubuntu.xenial:<wbr>obj:20076752000" version="1"<br>
> > comment="The 'drupal7' package."><br>
> > <linux-def:name>drupal7</<wbr>linux-def:name><br>
> > </linux-def:dpkginfo_object><br>
> ><br>
> ><br>
> > If the check return always true, it doesn't make sense...<br>
> ><br>
> > Thanks.<br>
> > Regards.<br>
> ><br>
> ><br>
> ><br>
> > On Wed, Nov 2, 2016 at 11:29 AM, Jesus Linares <<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>><br>
</span><span class="">> > <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a> <mailto:<a href="mailto:jesus@wazuh.com">jesus@wazuh.com</a>>>> wrote:<br>
> ><br>
> > Hi,<br>
> ><br>
> > this is from the specific<br>
> > CVE:<br>
> xenial_libapache-mod-jk:not-<wbr>affected(1:1.2.40+svn150520-1)<br>
> ><br>
> > So, if it is not affected for xenial, the check should<br>
> > include the "negate" in order to return that is not a<br>
> > vulnerability, right?.<br>
> ><br>
> > Regards.<br>
> ><br>
> ><br>
> > On Fri, Oct 28, 2016 at 9:10 PM, Seth Arnold<br>
> > <<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.com</a> <mailto:<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.<wbr>com</a>><br>
</span><span class="">> > <mailto:<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.<wbr>com</a> <mailto:<a href="mailto:seth.arnold@canonical.com">seth.arnold@canonical.<wbr>com</a>>>> wrote:<br>
> ><br>
> > On Fri, Oct 28, 2016 at 11:19:21AM +0200, Jesus Linares<br>
> > wrote:<br>
> > > I think this test should have the "negate" due to the comment "While<br>
> > > related to the CVE in some way, the 'libapache-mod-jk'<br>
> > package in* xenial<br>
> > > is not affected*". So, maybe the input of the script<br>
> > is wrong?. Where is<br>
> > > the input?.<br>
> ><br>
> > The input is from the ubuntu-cve-tracker bzr tree;<br>
> ><br>
> > <a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a> <<a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a>><br>
> > <<a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a> <<a href="https://code.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master" rel="noreferrer" target="_blank">https://code.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master</a>>><br>
> ><br>
> > In the case of this specific CVE:<br>
> ><br>
> > <a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a>><br>
> > <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a><br>
> <<a href="http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/active/CVE-2014-8111" rel="noreferrer" target="_blank">http://bazaar.launchpad.net/~<wbr>ubuntu-security/ubuntu-cve-<wbr>tracker/master/view/head:/<wbr>active/CVE-2014-8111</a>>><br>
> ><br>
> > Thanks<br>
> ><br>
> > --<br>
> > ubuntu-hardened mailing list<br>
> > <a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.ubuntu.<wbr>com</a><br>
> <mailto:<a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.<wbr>ubuntu.com</a>><br>
</span>> > <mailto:<a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.<wbr>ubuntu.com</a><br>
<div class="HOEnZb"><div class="h5">> <mailto:<a href="mailto:ubuntu-hardened@lists.ubuntu.com">ubuntu-hardened@lists.<wbr>ubuntu.com</a>>><br>
> ><br>
> <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a><br>
> <<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a>><br>
> <<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a><br>
> <<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened" rel="noreferrer" target="_blank">https://lists.ubuntu.com/<wbr>mailman/listinfo/ubuntu-<wbr>hardened</a>>><br>
> ><br>
> ><br>
> ><br>
> ><br>
> > --<br>
> > *Jesus Linares*<br>
> > /IT Security Engineer/<br>
> > /<br>
> > /<br>
> ><br>
> ><br>
> ><br>
> ><br>
> > --<br>
> > *Jesus Linares*<br>
> > /IT Security Engineer/<br>
> > /<br>
> > /<br>
> ><br>
> ><br>
> ><br>
> ><br>
> > --<br>
> > *Jesus Linares*<br>
> > /IT Security Engineer/<br>
> > /<br>
> > /<br>
> ><br>
> ><br>
> ><br>
> ><br>
> > --<br>
> > *Jesus Linares*<br>
> > /IT Security Engineer/<br>
> > /<br>
> > /<br>
> ><br>
> ><br>
><br>
><br>
><br>
><br>
><br>
> --<br>
> *Jesus Linares*<br>
> /IT Security Engineer/<br>
> /<br>
> /<br>
<br>
<br>
</div></div></blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><b style="font-size:12.8px"><font color="#0b5394">Jesus Linares</font></b><div style="font-size:12.8px"><i><font color="#999999">IT Security Engineer</font></i></div><div style="font-size:12.8px"><i><font color="#999999"><img src="https://docs.google.com/uc?export=download&id=0Bx75KsPzHxO_THFpRzBONGpoeWs&revid=0Bx75KsPzHxO_aG5WOW1OU3p3V3JOVUczVDlPViszMTdGZUtrPQ" width="96" height="16"><br></font></i></div></div></div>
</div>