/* * Copyright 2016-2018 Michael Gratton * * This software is licensed under the GNU Lesser General Public License * (version 2.1 or later). See the COPYING file in this distribution. */ class Geary.RFC822.MessageTest : TestCase { private const string BASIC_TEXT_PLAIN = "basic-text-plain.eml"; private const string BASIC_TEXT_HTML = "basic-text-html.eml"; private const string BASIC_MULTIPART_ALTERNATIVE = "basic-multipart-alternative.eml"; private const string BASIC_MULTIPART_TNEF = "basic-multipart-tnef.eml"; private const string HTML_CONVERSION_TEMPLATE = "
%s
"; private const string BASIC_PLAIN_BODY = """This is the first line. This is the second line. """; private const string BASIC_HTML_BODY = """

This is the first line.

This is the second line. """; private static string SIMPLE_MULTIRECIPIENT_TO_CC_BCC = "From: Jill Smith \r\nTo: Jane Doe \r\nCc: Jane Doe CC \r\nBcc: Jane Doe BCC \r\nSubject: Re: Saying Hello\r\nDate: Fri, 21 Nov 1997 10:01:10 -0600\r\n\r\nThis is a reply to your hello.\r\n\r\n"; private static string NETWORK_BUFFER_EXPECTED = "From: Alice \r\nSender: Bob \r\nTo: Charlie \r\nCC: Dave \r\nBCC: Eve \r\nReply-To: \"Alice: Personal Account\" \r\nSubject: Re: Basic text/plain message\r\nDate: Fri, 21 Nov 1997 10:01:10 -0600\r\nMessage-ID: <3456@example.net>\r\nIn-Reply-To: <1234@local.machine.example>\r\nReferences: <1234@local.machine.example>\r\nX-Mailer: Geary Test Suite 1.0\r\n\r\nThis is the first line.\r\n\r\nThis is the second line.\r\n\r\n"; private static string TEST_ATTACHMENT_IMAGE_FILENAME = "test-attachment-image.png"; public MessageTest() { base("Geary.RFC822.MessageTest"); add_test("basic_message_from_buffer", basic_message_from_buffer); add_test("encoded_recipient", encoded_recipient); add_test("duplicate_mailbox", duplicate_mailbox); add_test("duplicate_message_id", duplicate_message_id); add_test("text_plain_as_plain", text_plain_as_plain); add_test("text_plain_as_html", text_plain_as_html); add_test("text_html_as_html", text_html_as_html); add_test("text_html_as_plain", text_html_as_plain); #if WITH_TNEF_SUPPORT add_test("tnef_extract_attachments", tnef_extract_attachments); #endif // WITH_TNEF_SUPPORT add_test("multipart_alternative_as_plain", multipart_alternative_as_plain); add_test("multipart_alternative_as_converted_html", multipart_alternative_as_converted_html); add_test("multipart_alternative_as_html", multipart_alternative_as_html); add_test("get_preview", get_preview); add_test("get_recipients", get_recipients); add_test("get_searchable_body", get_searchable_body); add_test("get_searchable_recipients", get_searchable_recipients); add_test("from_composed_email", from_composed_email); add_test("from_composed_email_inline_attachments", from_composed_email_inline_attachments); add_test("get_rfc822_buffer", get_rfc822_buffer); add_test("get_rfc822_buffer_dot_stuff", get_rfc822_buffer_dot_stuff); add_test("get_rfc822_buffer_no_bcc", get_rfc822_buffer_no_bcc); add_test("get_rfc822_buffer_long_ascii_line", get_rfc822_buffer_long_ascii_line); } public void basic_message_from_buffer() throws GLib.Error { Message basic = resource_to_message(BASIC_TEXT_PLAIN); assert_data(basic.subject, "Re: Basic text/plain message"); assert_addresses(basic.from, "Alice "); assert_address(basic.sender, "Bob "); assert_addresses(basic.reply_to, "\"Alice: Personal Account\" "); assert_addresses(basic.to, "Charlie "); assert_addresses(basic.cc, "Dave "); assert_addresses(basic.bcc, "Eve "); assert_data(basic.message_id, "3456@example.net"); assert_message_id_list(basic.in_reply_to, "<1234@local.machine.example>"); assert_message_id_list(basic.references, "<1234@local.machine.example>"); assert_data(basic.date, "1997-11-21T10:01:10-0600"); assert(basic.mailer == "Geary Test Suite 1.0"); } public void encoded_recipient() throws GLib.Error { Message enc = string_to_message(ENCODED_TO); // Courtesy Mailsploit https://www.mailsploit.com assert_equal(enc.to[0].name, "potus@whitehouse.gov "); } public void duplicate_mailbox() throws GLib.Error { Message dup = string_to_message(DUPLICATE_TO); assert(dup.to.size == 2); assert_addresses( dup.to, "John Doe 1 , John Doe 2 " ); } public void duplicate_message_id() throws GLib.Error { Message dup = string_to_message(DUPLICATE_REFERENCES); assert(dup.references.size == 2); assert_message_id_list( dup.references, "<1234@local.machine.example> <5678@local.machine.example>" ); } public void text_plain_as_plain() throws GLib.Error { Message test = resource_to_message(BASIC_TEXT_PLAIN); assert_true(test.has_plain_body(), "Expected plain body"); assert_false(test.has_html_body(), "Expected non-html body"); assert_equal(test.get_plain_body(false, null), BASIC_PLAIN_BODY); } public void text_plain_as_html() throws GLib.Error { Message test = resource_to_message(BASIC_TEXT_PLAIN); assert_true(test.has_plain_body(), "Expected plain body"); assert_false(test.has_html_body(), "Expected non-html body"); assert_equal( test.get_plain_body(true, null), HTML_CONVERSION_TEMPLATE.printf(BASIC_PLAIN_BODY) ); } public void text_html_as_html() throws GLib.Error { Message test = resource_to_message(BASIC_TEXT_HTML); assert_true(test.has_html_body(), "Expected html body"); assert_false(test.has_plain_body(), "Expected non-plain body"); assert_equal(test.get_html_body(null), BASIC_HTML_BODY); } public void text_html_as_plain() throws GLib.Error { Message test = resource_to_message(BASIC_TEXT_HTML); assert_true(test.has_html_body(), "Expected html body"); assert_false(test.has_plain_body(), "Expected non-plain body"); assert_equal(test.get_html_body(null), BASIC_HTML_BODY); } public void tnef_extract_attachments() throws GLib.Error { Message test = resource_to_message(BASIC_MULTIPART_TNEF); Gee.List attachments = test.get_attachments(); assert_true(attachments.size == 2); assert_true(attachments[0].get_clean_filename() == "zappa_av1.jpg"); assert_true(attachments[1].get_clean_filename() == "bookmark.htm"); } public void multipart_alternative_as_plain() throws GLib.Error { Message test = resource_to_message(BASIC_MULTIPART_ALTERNATIVE); assert_true(test.has_plain_body(), "Expected plain body"); assert_true(test.has_html_body(), "Expected html body"); assert_equal(test.get_plain_body(false, null), BASIC_PLAIN_BODY); } public void multipart_alternative_as_converted_html() throws GLib.Error { Message test = resource_to_message(BASIC_MULTIPART_ALTERNATIVE); assert_true(test.has_plain_body(), "Expected plain body"); assert_true(test.has_html_body(), "Expected html body"); assert_equal( test.get_plain_body(true, null), HTML_CONVERSION_TEMPLATE.printf(BASIC_PLAIN_BODY) ); } public void multipart_alternative_as_html() throws GLib.Error { Message test = resource_to_message(BASIC_MULTIPART_ALTERNATIVE); assert_true(test.has_plain_body(), "Expected plain body"); assert_true(test.has_html_body(), "Expected html body"); assert_equal(test.get_html_body(null), BASIC_HTML_BODY); } public void get_preview() throws GLib.Error { Message multipart_signed = string_to_message(MULTIPART_SIGNED_MESSAGE_TEXT); assert(multipart_signed.get_preview() == MULTIPART_SIGNED_MESSAGE_PREVIEW); } public void get_recipients() throws GLib.Error { Message test = string_to_message(SIMPLE_MULTIRECIPIENT_TO_CC_BCC); Gee.List? addresses = test.get_recipients(); Gee.List verify_list = new Gee.ArrayList(); verify_list.add("Jane Doe "); verify_list.add("Jane Doe CC "); verify_list.add("Jane Doe BCC "); assert_addresses_list(addresses, verify_list, "get_recipients"); } public void get_searchable_body() throws GLib.Error { Message test = resource_to_message(BASIC_TEXT_HTML); string searchable = test.get_searchable_body(); assert_true(searchable.contains("This is the first line"), "Expected body text"); assert_false(searchable.contains("

"), "Expected html removed"); } public void get_searchable_recipients() throws GLib.Error { Message test = string_to_message(SIMPLE_MULTIRECIPIENT_TO_CC_BCC); string searchable = test.get_searchable_recipients(); assert_true(searchable.contains("Jane Doe "), "Expected to address"); assert_true(searchable.contains("Jane Doe CC "), "Expected cc address"); assert_true(searchable.contains("Jane Doe BCC "), "Expected bcc address"); } public void get_rfc822_buffer() throws GLib.Error { Message test = resource_to_message(BASIC_TEXT_PLAIN); Memory.Buffer buffer = test.get_rfc822_buffer(NONE); assert_true(buffer.to_string() == NETWORK_BUFFER_EXPECTED, "Network buffer differs"); } public void get_rfc822_buffer_dot_stuff() throws GLib.Error { RFC822.MailboxAddress to = new RFC822.MailboxAddress( "Test", "test@example.com" ); RFC822.MailboxAddress from = new RFC822.MailboxAddress( "Sender", "sender@example.com" ); Geary.ComposedEmail composed = new Geary.ComposedEmail( new GLib.DateTime.now_local(), new Geary.RFC822.MailboxAddresses.single(from) ).set_to(new Geary.RFC822.MailboxAddresses.single(to)); composed.body_text = ".newline\n.\n"; this.message_from_composed_email.begin( composed, this.async_completion ); Geary.RFC822.Message message = message_from_composed_email.end(async_result()); string message_data = message.get_rfc822_buffer(SMTP_FORMAT).to_string(); assert_true(message_data.has_suffix("..newline\r\n..\r\n")); } public void get_rfc822_buffer_no_bcc() throws GLib.Error { RFC822.MailboxAddress to = new RFC822.MailboxAddress( "Test", "test@example.com" ); RFC822.MailboxAddress bcc = new RFC822.MailboxAddress( "BCC", "bcc@example.com" ); RFC822.MailboxAddress from = new RFC822.MailboxAddress( "Sender", "sender@example.com" ); Geary.ComposedEmail composed = new Geary.ComposedEmail( new GLib.DateTime.now_local(), new Geary.RFC822.MailboxAddresses.single(from) ).set_to( new Geary.RFC822.MailboxAddresses.single(to) ).set_bcc( new Geary.RFC822.MailboxAddresses.single(bcc) ); composed.body_text = "\nbody\n"; this.message_from_composed_email.begin( composed, this.async_completion ); Geary.RFC822.Message message = message_from_composed_email.end(async_result()); string message_data = message.get_rfc822_buffer(SMTP_FORMAT).to_string(); assert_true("To: Test \r\n" in message_data); assert_false("bcc" in message_data.down()); } public void get_rfc822_buffer_long_ascii_line() throws GLib.Error { RFC822.MailboxAddress to = new RFC822.MailboxAddress( "Test", "test@example.com" ); RFC822.MailboxAddress from = new RFC822.MailboxAddress( "Sender", "sender@example.com" ); Geary.ComposedEmail composed = new Geary.ComposedEmail( new GLib.DateTime.now_local(), new Geary.RFC822.MailboxAddresses.single(from) ).set_to(new Geary.RFC822.MailboxAddresses.single(to)); GLib.StringBuilder buf = new GLib.StringBuilder(); for (int i = 0; i < 2000; i++) { buf.append("long "); } //composed.body_text = buf.str; composed.body_html = "

%s

".printf(buf.str); this.message_from_composed_email.begin( composed, this.async_completion ); Geary.RFC822.Message message = message_from_composed_email.end(async_result()); string message_data = message.get_rfc822_buffer(SMTP_FORMAT).to_string(); foreach (var line in message_data.split("\n")) { assert_true(line.length < 1000, line); } } public void from_composed_email() throws GLib.Error { RFC822.MailboxAddress to = new RFC822.MailboxAddress( "Test", "test@example.com" ); RFC822.MailboxAddress from = new RFC822.MailboxAddress( "Sender", "sender@example.com" ); Geary.ComposedEmail composed = new Geary.ComposedEmail( new GLib.DateTime.now_local(), new Geary.RFC822.MailboxAddresses.single(from) ).set_to(new Geary.RFC822.MailboxAddresses.single(to)); composed.body_text = "hello"; this.message_from_composed_email.begin( composed, this.async_completion ); Geary.RFC822.Message message = message_from_composed_email.end(async_result()); assert_non_null(message.to, "to"); assert_non_null(message.from, "from"); assert_non_null(message.date, "date"); assert_non_null(message.message_id, "message_id"); string message_data = message.to_string(); assert_true( message_data.contains("To: Test \n"), "to data" ); assert_true( message_data.contains("From: Sender \n"), "from data" ); assert_true( message_data.contains("Message-Id: "), "message-id data" ); assert_true( message_data.contains("Date: "), "date data" ); assert_true( message_data.contains("hello\n"), "body data" ); } public void from_composed_email_inline_attachments() throws GLib.Error { RFC822.MailboxAddress to = new RFC822.MailboxAddress( "Test", "test@example.com" ); RFC822.MailboxAddress from = new RFC822.MailboxAddress( "Sender", "sender@example.com" ); Geary.ComposedEmail composed = new Geary.ComposedEmail( new GLib.DateTime.now_local(), new Geary.RFC822.MailboxAddresses.single(from) ).set_to(new Geary.RFC822.MailboxAddresses.single(to)); composed.body_html = ""; GLib.File resource = GLib.File.new_for_uri(RESOURCE_URI).resolve_relative_path(TEST_ATTACHMENT_IMAGE_FILENAME); uint8[] contents; resource.load_contents(null, out contents, null); Geary.Memory.ByteBuffer buffer = new Geary.Memory.ByteBuffer(contents, contents.length); composed.cid_files[TEST_ATTACHMENT_IMAGE_FILENAME] = buffer; Geary.Memory.ByteBuffer buffer2 = new Geary.Memory.ByteBuffer(contents, contents.length); composed.inline_files["needing_cid.png"] = buffer2; this.message_from_composed_email.begin( composed, this.async_completion ); Geary.RFC822.Message message = message_from_composed_email.end(async_result()); Gee.List attachments = message.get_attachments(); bool found_first = false; bool found_second = false; bool second_id_renamed = false; foreach (Part part in attachments) { if (part.get_clean_filename() == TEST_ATTACHMENT_IMAGE_FILENAME) { found_first = true; } else if (part.get_clean_filename() == "needing_cid.png") { found_second = true; second_id_renamed = part.content_id != "needing_cid.png"; } } assert_true(found_first, "Expected CID attachment"); assert_true(found_second, "Expected inline attachment"); assert_true(second_id_renamed, "Expected inline attachment renamed"); string html_body = message.get_html_body(null); assert_false(html_body.contains("src=\"needing_cid.png\""), "Expected updated attachment content ID"); Memory.Buffer out_buffer = message.get_native_buffer(); assert_true(out_buffer.size > (buffer.size+buffer2.size), "Expected sizeable message"); } private async Message message_from_composed_email(ComposedEmail composed) throws GLib.Error { return yield new Geary.RFC822.Message.from_composed_email( composed, GMime.utils_generate_message_id(composed.from.get(0).domain), null ); } private Message resource_to_message(string path) throws GLib.Error { GLib.File resource = GLib.File.new_for_uri(RESOURCE_URI).resolve_relative_path(path); uint8[] contents; resource.load_contents(null, out contents, null); return new Message.from_buffer( new Geary.Memory.ByteBuffer(contents, contents.length) ); } private Message string_to_message(string message_text) throws GLib.Error { return new Message.from_buffer( new Geary.Memory.StringBuffer(message_text) ); } private void assert_data(Geary.MessageData.AbstractMessageData? actual, string expected) throws GLib.Error { assert_non_null(actual, expected); assert_equal(actual.to_string(), expected); } private void assert_address(Geary.RFC822.MailboxAddress? address, string expected) throws GLib.Error { assert_non_null(address, expected); assert_equal(address.to_rfc822_string(), expected); } private void assert_addresses(Geary.RFC822.MailboxAddresses? addresses, string expected) throws GLib.Error { assert_non_null(addresses, expected); assert_equal(addresses.to_rfc822_string(), expected); } private void assert_addresses_list(Gee.List? addresses, Gee.List expected, string context) throws GLib.Error { assert_non_null(addresses, context + " not null"); assert_true(addresses.size == expected.size, context + " size"); foreach (RFC822.MailboxAddress address in addresses) { assert_true(expected.contains(address.to_rfc822_string()), context + " missing"); } } private void assert_message_id_list(Geary.RFC822.MessageIDList? ids, string expected) throws GLib.Error { assert_non_null(ids, "ids are null"); assert_equal(ids.to_rfc822_string(), expected); } // Courtesy Mailsploit https://www.mailsploit.com private static string ENCODED_TO = "From: Mary Smith \r\nTo: =?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3YiIDx0ZXN0Pg==?= \r\nSubject: Re: Saying Hello\r\nDate: Fri, 21 Nov 1997 10:01:10 -0600\r\n\r\nThis is a reply to your hello.\r\n\r\n"; private static string DUPLICATE_TO = "From: Mary Smith \r\nTo: John Doe 1 \r\nTo: John Doe 2 \r\nSubject: Re: Saying Hello\r\nDate: Fri, 21 Nov 1997 10:01:10 -0600\r\n\r\nThis is a reply to your hello.\r\n\r\n"; private static string DUPLICATE_REFERENCES = "From: Mary Smith \r\nTo: John Doe \r\nReferences: <1234@local.machine.example>\r\nReferences: <5678@local.machine.example>\r\nSubject: Re: Saying Hello\r\nDate: Fri, 21 Nov 1997 10:01:10 -0600\r\n\r\nThis is a reply to your hello.\r\n\r\n"; private static string MULTIPART_SIGNED_MESSAGE_TEXT = "Return-Path: \r\nReceived: from mogul.quuxo.net ([unix socket])\r\n by mogul (Cyrus v2.4.12-Debian-2.4.12-2) with LMTPA;\r\n Wed, 21 Dec 2016 06:54:03 +1030\r\nX-Sieve: CMU Sieve 2.4\r\nReceived: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19])\r\n by mogul.quuxo.net (8.14.4/8.14.4/Debian-2ubuntu2.1) with ESMTP id uBKKNtpt026727\r\n for ; Wed, 21 Dec 2016 06:53:57 +1030\r\nReceived: from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\r\n by huckleberry.canonical.com with esmtp (Exim 4.76)\r\n (envelope-from )\r\n id 1cJQwM-0003Xk-IO; Tue, 20 Dec 2016 20:23:14 +0000\r\nReceived: from 208-151-246-43.dq1sn.easystreet.com ([208.151.246.43]\r\n helo=lizaveta.nxnw.org)\r\n by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32)\r\n (Exim 4.76) (envelope-from )\r\n id 1cJQin-0000t2-G6\r\n for ubuntu-security-announce@lists.ubuntu.com; Tue, 20 Dec 2016 20:09:14 +0000\r\nReceived: from kryten.nxnw.org (kryten.nxnw.org [10.19.96.254])\r\n (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\r\n (Client CN \"kryten.int.wirex.com\", Issuer \"nxnw.org\" (not verified))\r\n by lizaveta.nxnw.org (Postfix) with ESMTPS id DD8C360941\r\n for ;\r\n Tue, 20 Dec 2016 12:09:06 -0800 (PST)\r\nReceived: by kryten.nxnw.org (Postfix, from userid 1000)\r\n id 84341342F6C; Tue, 20 Dec 2016 12:09:06 -0800 (PST)\r\nDate: Tue, 20 Dec 2016 12:09:06 -0800\r\nFrom: Steve Beattie \r\nTo: ubuntu-security-announce@lists.ubuntu.com\r\nSubject: [USN-3159-1] Linux kernel vulnerability\r\nMessage-ID: <20161220200906.GF8251@nxnw.org>\r\nMail-Followup-To: Ubuntu Security \r\nMIME-Version: 1.0\r\nUser-Agent: Mutt/1.5.24 (2015-08-30)\r\nX-Mailman-Approved-At: Tue, 20 Dec 2016 20:23:12 +0000\r\nX-BeenThere: ubuntu-security-announce@lists.ubuntu.com\r\nX-Mailman-Version: 2.1.14\r\nPrecedence: list\r\nReply-To: ubuntu-users@lists.ubuntu.com, Ubuntu Security \r\nList-Id: Ubuntu Security Announcements\r\n \r\nList-Unsubscribe: , \r\n \r\nList-Archive: \r\nList-Post: \r\nList-Help: \r\nList-Subscribe: , \r\n \r\nContent-Type: multipart/mixed; boundary=\"===============7564301068935298617==\"\r\nErrors-To: ubuntu-security-announce-bounces@lists.ubuntu.com\r\nSender: ubuntu-security-announce-bounces@lists.ubuntu.com\r\nX-Greylist: Sender IP whitelisted by DNSRBL, not delayed by milter-greylist-4.3.9 (mogul.quuxo.net [203.18.245.241]); Wed, 21 Dec 2016 06:53:57 +1030 (ACDT)\r\nX-Virus-Scanned: clamav-milter 0.99.2 at mogul\r\nX-Virus-Status: Clean\r\nX-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED\r\n autolearn=ham version=3.3.2\r\nX-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on mogul.quuxo.net\r\n\r\n\r\n--===============7564301068935298617==\r\nContent-Type: multipart/signed; micalg=pgp-sha512;\r\n protocol=\"application/pgp-signature\"; boundary=\"O98KdSgI27dgYlM5\"\r\nContent-Disposition: inline\r\n\r\n\r\n--O98KdSgI27dgYlM5\r\nContent-Type: text/plain; charset=us-ascii\r\nContent-Disposition: inline\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-3159-1\r\nDecember 20, 2016\r\n\r\nlinux vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nThe system could be made to expose sensitive information.\r\n\r\nSoftware Description:\r\n- linux: Linux kernel\r\n\r\nDetails:\r\n\r\nIt was discovered that a race condition existed in the procfs\r\nenviron_read function in the Linux kernel, leading to an integer\r\nunderflow. A local attacker could use this to expose sensitive\r\ninformation (kernel memory).\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 12.04 LTS:\r\n linux-image-3.2.0-119-generic 3.2.0-119.162\r\n linux-image-3.2.0-119-generic-pae 3.2.0-119.162\r\n linux-image-3.2.0-119-highbank 3.2.0-119.162\r\n linux-image-3.2.0-119-omap 3.2.0-119.162\r\n linux-image-3.2.0-119-powerpc-smp 3.2.0-119.162\r\n linux-image-3.2.0-119-powerpc64-smp 3.2.0-119.162\r\n linux-image-3.2.0-119-virtual 3.2.0-119.162\r\n linux-image-generic 3.2.0.119.134\r\n linux-image-generic-pae 3.2.0.119.134\r\n linux-image-highbank 3.2.0.119.134\r\n linux-image-omap 3.2.0.119.134\r\n linux-image-powerpc-smp 3.2.0.119.134\r\n linux-image-powerpc64-smp 3.2.0.119.134\r\n linux-image-virtual 3.2.0.119.134\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nATTENTION: Due to an unavoidable ABI change the kernel updates have\r\nbeen given a new version number, which requires you to recompile and\r\nreinstall all third party kernel modules you might have installed.\r\nUnless you manually uninstalled the standard kernel metapackages\r\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\r\nlinux-powerpc), a standard system upgrade will automatically perform\r\nthis as well.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-3159-1\r\n CVE-2016-7916\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/linux/3.2.0-119.162\r\n\r\n\r\n--O98KdSgI27dgYlM5\r\nContent-Type: application/pgp-signature; name=\"signature.asc\"\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\nnSj5HG2dTMTOHDjVGSVV\r\n=qUGf\r\n-----END PGP SIGNATURE-----\r\n\r\n--O98KdSgI27dgYlM5--\r\n\r\n\r\n--===============7564301068935298617==\r\nContent-Type: text/plain; charset=\"us-ascii\"\r\nMIME-Version: 1.0\r\nContent-Transfer-Encoding: 7bit\r\nContent-Disposition: inline\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n--===============7564301068935298617==--\r\n"; private static string MULTIPART_SIGNED_MESSAGE_PREVIEW = "Ubuntu Security Notice USN-3159-1 December 20, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: The system could be made to expose sensitive information. Software Description: - linux: Linux kernel Details: It was discovered that a race condition existed in the procfs environ_read function in the Linux kernel, leading to an integer underflow. A local attacker could use this to expose sensitive information (kernel memory). Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: linux-image-3.2.0-119-generic 3.2.0-119.162 linux-image-3.2.0-119-generic-pae 3.2.0-119.162 linux-image-3.2.0-119-highbank 3.2.0-119.162 linux-image-3.2.0-119-omap 3.2.0-119.162 linux-image-3.2.0-119-powerpc-smp 3.2.0-119.162 linux-image-3.2.0-119-powerpc64-smp 3.2.0-119.162 linux-image-3.2.0-119-virtual 3.2.0-119.162 linux-image-generic 3.2.0.119.134 linux-image-generic-pae 3.2.0.119.134 linux-image-highbank 3.2.0.119.134 linux-image-omap 3.2.0.119.134 linux-image-powerpc-smp 3.2.0.119.134 linux-image-powerpc64-smp 3.2.0.119.134 linux-image-virtual 3.2.0.119.134 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: http://www.ubuntu.com/usn/usn-3159-1 CVE-2016-7916 Package Information: https://launchpad.net/ubuntu/+source/linux/3.2.0-119.162 ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce"; }