*** This bug is a security vulnerability *** Public security bug reported:
Copying from the Debian bug: --- The following vulnerability was published for firewalld. CVE-2016-5410[0]: Firewall configuration can be modified by any logged in user If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-5410 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1360135 [2] http://seclists.org/oss-sec/2016/q3/291 [3] https://github.com/t-woerner/firewalld/commit/0371995a58ec4c777960007b7dbee93933f760cb --- This only affects firewalld >= 0.3.12 & < 0.4.3.3 (so trusty is not affected). ** Affects: firewalld (Ubuntu) Importance: Undecided Status: New ** Affects: firewalld (Ubuntu Xenial) Importance: Undecided Status: New ** Affects: firewalld (Debian) Importance: Unknown Status: Unknown ** Bug watch added: Debian Bug tracker #834529 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834529 ** Also affects: firewalld (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834529 Importance: Unknown Status: Unknown ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-5410 ** Also affects: firewalld (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1617617 Title: Firewall configuration can be modified by any logged in user Status in firewalld package in Ubuntu: New Status in firewalld source package in Xenial: New Status in firewalld package in Debian: Unknown Bug description: Copying from the Debian bug: --- The following vulnerability was published for firewalld. CVE-2016-5410[0]: Firewall configuration can be modified by any logged in user If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-5410 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1360135 [2] http://seclists.org/oss-sec/2016/q3/291 [3] https://github.com/t-woerner/firewalld/commit/0371995a58ec4c777960007b7dbee93933f760cb --- This only affects firewalld >= 0.3.12 & < 0.4.3.3 (so trusty is not affected). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firewalld/+bug/1617617/+subscriptions _______________________________________________ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : [email protected] Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp

