Octagalland ~ubuntu-security membership application

Verified identity

I am a member of ~canonical-security, my identity has been verified through a background check, in person, and during the onboarding process.

History of high-quality sponsored security updates

I researched, backported and tested patches for security vulnerabilities in a variety of packages, listed below.

USNs:

  • USN-6808-1: Package “atril”, 1 CVE, patched for: 16.04, 18.04, 20.04, 22.04, 23.10
  • USN-6826-1: Package “libapache-mod-jk”, 1 CVE, patched for: 16.04, 18.04, 20.04, 22.04, 23.10
  • USN-6566-2: Package “sqlite3”, 1 CVE, patched for 18.04
  • USN-6943-1: Packages “tomcat8” & “tomcat9”, 5 CVEs, patched for: 16.04, 18.04, 20.04, 22.04
  • USN-6961-1: Package “busybox”, 4 CVEs, patched for: 20.04, 22.04, 24.04, 24.10
  • USN-6981-1: Package “drupal7”, 3 CVEs, patched for: 16.04
  • USN-6983-1: Package “ffmpeg”, 1 CVE, patched for: 16.04, 18.04, 20.04, 22.04, 24.04
  • USN-6981-2: Package “drupal7”, 3 CVEs, patched for: 14.04
  • USN-7032-1: Package “tomcat8” & “tomcat9”, 1 CVE patched for 18.04, 20.04, 22.04, 24.04, 24.10

The following table shows how this set of updates covers the various ESM/release/component combinations:

(*) ESM update

Additionally, I contributed several security updates to internal projects. I’ll be happy to provide further information on these updates upon request.

QRT tests added:

  • busybox: Reproduces old heap overflow and UAF vulnerabilities in awk
  • cyrus imapd: Reproduces an old DOS through hash collisions on a hash-map implementation, using statistical analysis to determine whether the vulnerability is present or not
  • libapache-mod-jk: Reproduces an old vulnerability whereby requests would be incorrectly forwarded to Tomcat for resolution, which could lead to bypass of security constraints.
  • atril: Reproduces a path traversal vulnerability that allows for arbitrary file creation when opening an epub file.

Security updates troubleshooting:

  • While working on the patch for CVE-2023-46589 on Ubuntu 24.10 (which was the development release as of the time of patching) I encountered a FTBFS error on Tomcat 9. This issue was due to a change introduced in one of the dependencies (libeclipse-jdt-core-java), which changed the location of a .jar file imported by the package. This issue only surfaced while building the package on the Launchpad CI pipeline, which made us realise that the Argentine mirror for the Ubuntu archive was badly out of sync. This synchronisation error prevented the latest version of the dependency from being used, and that was the reason why the build was failing on Launchpad but not on my host.
    In order to troubleshoot this error I had to go through the build log to identify which Java import was causing the error, identify the jar file that provided that class, and then the package that provided that jar file. After going through that project’s history I found a change to the project structure which moved the relevant class to a different jar file, which was the one that should have been used to successfully build Tomcat 9.

  • While working on CVE patches for Busybox I also ran into an issue whereby, when trying to install the patched package on my testing VM, the version of the package available on the repositories had a higher pin-priority than the one available in my local repository, which could hinder the testing workflow. This led to a fix in UQT to automatically assign the highest pin-priority to the local repository when using the uvt utility (see “Demonstrated understanding of required tools and systems” below for a link to the relevant MP).

Continued, on-going security updates

As a member of the Security Engineering team, I will continue to work on security updates on a regular basis.

Demonstrated understanding of required tools and systems

Sample of updates to the Ubuntu CVE Tracker:

UCT fixes/improvements:

UST fixes/improvements:

UQT fixes/improvements:

  • https://code.launchpad.net/~octagalland/ubuntu-qa-tools/+git/ubuntu-qa-tools/+merge/470446: When using uvt repo -e, use highest available pin-priority for the local repository. This was motivated by the fact that ESM PPAs are currently configured with a higher than default priority on virtual machines. As a result, when testing an update for a package from an ESM PPA, a normal update would not have installed the patched version of the package from the local repository.

USN tool fixes/improvements:

Additionally, I contributed tooling fixes to internal projects. I’ll be happy to provide further information on these fixes upon request.

Demonstrated responsive and respectful communication

I have signed the code of conduct. I regularly monitor Launchpad bugs for packages I have patched, as well as relevant mailing list announcements, looking for possible regressions. Only once I received an inquiry from a community member about an update, to which I replied by providing the requested information and pointing them to our CVE tracker (since the community member was asking what other vulnerabilities affected the patched package).

Demonstrated understanding of the responsibility of ~ubuntu-security membership

I am following credentials best practices, my disk is fully encrypted, and have 2FA enabled for all accounts.

1 Like

+1 from me for @octagalland to join ~ubuntu-security - he clearly meets all the respective criteria outlined in [spec] ~ubuntu-security membership and has made significant contributions to the security of Ubuntu.

@octagalland has met all the criteria to join ~ubuntu-security and consistently produced outstanding work with each contribution. +1 from me!

+1 from me as @octagalland has been doing quality work on the tooling side and helping improve QA testing, as well as meeting all the criterias.

The evidence supports that @octagalland meets all necessary criteria for membership.

They have shown great initiative and delivered strong contributions for the team’s benefit, earning my vote (+1).

+1 from me as well to support @octagalland 's application to join ~ubuntu-security. He has done an outstanding work across the various expected fronts. He is an excellent security engineer.

+1 to add @octagalland to ~ubuntu-security. Octa does quality work and takes the iniative. I appreciate that Octa takes the time to resolve underlying issues and takes on challenging issues.

@octagalland has clearly met each requirement to join ~ubuntu-security and has done some excellent work with all contributions. +1 from me!

@octagalland is a quick learner and started to help the team very quick since he joined. He meets all criterias to be a member. +1 from me.

+1 fro me as well for granting membership to lp:~ubuntu-security to @octagalland , nice work!

+1 from me as @octagalland has showing an excellent work and met all the requirements to join ~ubuntu-security!

+1 from me on granting @octagalland membership!

+1 to add @octagalland to ~ubuntu-security.
Thanks Octa for the great work

Thank you @octagalland for your application, and thank you to everyone who gave feedback on the application. Voting is now closed.

The following votes were cast by existing Ubuntu Security members:

The application is approved with a balance of 11 affirmative votes making up 100% of the total votes cast.

Congratulations and welcome Octavio Galland! I have added you to the Ubuntu Security team, please exercise caution with your new rights.

Thanks,
Steve Beattie