Bug#725144: [Pkg-libvirt-maintainers] Bug#725144: libvirt-bin: Please build with apparmor support.

2014-01-30 Thread Jamie Strandboge
; Jamie, what do you think about this? > I agree that it is awkward to have them in different places, which is why it is the way it is now (and has been this way upstream and in Ubuntu for years-- which isn't a point to not fix things, just saying it isn't a new problem). libvirt w

Bug#731863: python-ufw: fails to upgrade from 'testing' - trying to overwrite /usr/share/pyshared/ufw/backend_iptables.py

2013-12-10 Thread Jamie Strandboge
Thanks for the bug and I'll get this fixed in the next upload. Note that in the normal upgrade case, python-ufw will not be pulled in as part of the upgrade because ufw itself does not depend on it so it doesn't get pulled in as part of the upgrade (which is why I've not seen this bug before now).

Bug#735773: open-iscsi: World readable CHAP credentials in iscsid.conf

2014-01-17 Thread Jamie Strandboge
Package: open-iscsi Version: 2.0.873-3 Severity: normal Forwarding LP: #1268240 from Ubuntu: "/etc/iscsi/iscsid.conf is world readable but it may contain CHAP credentials. This affects at least Precise and Saucy." I also confirmed this on 14.04 (2.0.873-3ubuntu7). This is arguably a security bu

Bug#740289: openjdk-6: [PATCH] fixes for backport releases

2014-02-27 Thread Jamie Strandboge
Package: openjdk-6 Version: 6b30-1.13.1-1 Severity: serious Tags: patch Justification: fails to build from source (but built successfully in the past) User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch Dear Maintainer, In preparing security updates for older releases

Bug#697865: libnss3-1d: fix for DSA-2599 is incomplete

2013-01-10 Thread Jamie Strandboge
Package: libnss3-1d Version: 3.12.8-1+squeeze6 Severity: grave Tags: security Justification: user security hole -- System Information: Debian Release: 6.0.6 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Versions of packages libnss3-1d depends on: ii libc6

Bug#697928: suricata: debian/suricata.init should also support af-packet

2013-01-11 Thread Jamie Strandboge
Package: suricata Version: 1.4-3 Severity: wishlist Tags: patch Dear Maintainer, It would be nice if you could set in /etc/default/suricata: LISTENMODE=af-packet Attached is a patch to do that. Also, the start-stop-daemon in 'stop' seems extraneous. It was not working right via cron so I commen

Bug#693752: python-django: self-test failure with 1.4.2-1

2012-11-19 Thread Jamie Strandboge
Package: python-django Version: 1.4.2-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring ubuntu-patch Dear Maintainer, 1.4.2-1 introduced testsuite fixes for the patches to fix CVE-2012-4520. This breaks 'manage.py test' when ADMINS or MANAGERS is se

Bug#656278: t1lib: [PATCH] fixes for remaining CVEs

2012-01-17 Thread Jamie Strandboge
Package: t1lib Version: 5.1.2-3.4 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: fix

Bug#656377: libxml2: [PATCH] fix for CVE-2011-3919

2012-01-18 Thread Jamie Strandboge
Package: libxml2 Version: 2.7.8.dfsg-5.1 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDAT

Bug#656535: rsyslog: [PATCH] add $WorkDirectory to /etc/rsyslog.conf for FHS compliance

2012-01-19 Thread Jamie Strandboge
Package: rsyslog Version: 5.8.6-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch Dear Maintainer, I'd like for you to consider applying the attached patch to achieve the following: * debian/rsyslog.conf: set $WorkDirectory to /var/

Bug#658495: ufw: [INTL:nl] Dutch translation of debconf templates

2012-02-03 Thread Jamie Strandboge
On Fri, 2012-02-03 at 15:23 +0100, Jeroen Schot wrote: > Hello, > > Attached is the Dutch translation of the ufw debconf templates. > Please include it in your next upload. Hi! Thanks for this translation. Has someone from debian-l10n-dutch had a chance to review this? signature.asc Descriptio

Bug#658495: ufw: [INTL:nl] Dutch translation of debconf templates

2012-02-03 Thread Jamie Strandboge
On Fri, 2012-02-03 at 16:55 +0100, Jeroen Schot wrote: > On Fri, Feb 03, 2012 at 09:33:49AM -0600, Jamie Strandboge wrote: > > On Fri, 2012-02-03 at 15:23 +0100, Jeroen Schot wrote: > > > Attached is the Dutch translation of the ufw debconf templates. > > > Please inc

Bug#682476: ufw: Log message is broken

2012-07-23 Thread Jamie Strandboge
ptables that is compiled with gcc-4.7. Specifically: http://bugzilla.netfilter.org/show_bug.cgi?id=774 https://bugs.launchpad.net/ubuntu/+source/iptables/+bug/1027252 Upstream has not decided on a fix yet, so I did not forward the patch to Debian yet. -- Jamie Strandboge | http://www.canon

Bug#684449: unblock: ufw/0.31.1-2

2012-08-09 Thread Jamie Strandboge
way of +anything and are gone after the next reboot. Using upstream's ufw-init has +the important benefit of always cleaning what it needs. (Closes: 672439). +- debian/prerm: call '/lib/ufw/ufw-init stop' on removal +- debian/postrm: don't flush the chains on pur

Bug#686872: python-urllib3 should default to verifying certificates

2012-09-06 Thread Jamie Strandboge
.3/debian/patches/02_require-cert-verification.patch 2012-09-06 16:15:25.0 -0500 @@ -0,0 +1,18 @@ +Author: Jamie Strandboge +Description: require SSL certificate validation by default by using + CERT_REQUIRED and using the system /etc/ssl/certs/ca-certificates.crt +Bug-Ubuntu: https://lau

Bug#645769: virt-viewer: cherrypick upstream zoom and title fixes from upstream

2011-10-18 Thread Jamie Strandboge
Package: virt-viewer Version: 0.4.1-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch In Ubuntu, the attached patch was applied to achieve the following: * 0003-set-window-title-with-domain-name.patch: set window title to use dom

Bug#632484: [PATCH] honeyd FTBFS (configure: error: Couldn't figure out how to access libc)

2011-09-15 Thread Jamie Strandboge
Package: honeyd Version: 1.5c-8 Followup-For: Bug #632484 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmpNjoEKf In Ubuntu, the attached patch was applied to achieve the following: [ Steve Langasek ] * configure.in: Fix wrong attempt to use dlsym

Bug#704728: (no subject)

2013-07-01 Thread Jamie Strandboge
> ERROR: problem running ufw-init > Seems like the kernel doesn't support everything that is required by ufw. You can use '/usr/share/ufw/check-requirements' (as root) to see. -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#714529: lcms2 needs security updates found in the last openjdk-7 security updates (CVE-2013-4160)

2013-07-31 Thread Jamie Strandboge
FYI, Ubuntu fixed this here: http://www.ubuntu.com/usn/usn-1911-1/ Attached is the debdiff used for Ubuntu 12.04 LTS, which is based on Debian's 2.2+git20110628-2. -- Jamie Strandboge http://www.ubuntu.com/ diff -Nru lcms2-2.2+git20110628/debian/changelog lcms

Bug#647315: Security issue (no CVE yet)

2011-11-09 Thread Jamie Strandboge
FYI, this now has a CVE (CVE-2011-4103) amd looks to be fixed in 0.2.2-2: python-django-piston (0.2.2-2) unstable; urgency=low [ Michael Ziegler ] * Bump Standards Version to 3.9.2. * Remove reference to /usr/share/common-licenses/BSD and strip trailing whitespace in copyright. * Fix

Bug#663677: ufw: FTBFS: Test suite failure

2012-03-13 Thread Jamie Strandboge
but expected '1' > ** FAIL ** Yes, this is https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/947224 and fixed in 0.31. I will be preparing an upload for Debian soon. -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#664748: ufw: don't log to the kernel log

2012-03-21 Thread Jamie Strandboge
On Wed, 2012-03-21 at 19:34 +0530, Ritesh Raj Sarraf wrote: > On Tuesday 20 March 2012 09:14 PM, Jamie Strandboge wrote: > > It isn't ufw that is doing the logging, it is the kernel via netfilter. > > As such, logged policy vilations cannot be removed by ufw. For kern.log,

Bug#673331: backuppc: fix for CVE-2011-5081

2012-05-17 Thread Jamie Strandboge
Package: backuppc Version: 3.2.1-2 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: XSS

Bug#677427: raptor: Fix for CVE-2012-0037 no applied during build

2012-06-13 Thread Jamie Strandboge
Package: raptor Version: 1.4.21-7 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch Dear Maintainer, While 1.4.21-7 claims to fix CVE-2012-0037, it does not because debian/patches/series was not

Bug#677587: apt net-update does not check subkeys for collisions

2012-06-14 Thread Jamie Strandboge
Package: apt Version: 0.9.6 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * adjust apt-key to ensure no collisions on subkeys too. Patch thanks t

Bug#667942: [INTL:pl] Polish debconf translation

2012-05-03 Thread Jamie Strandboge
d in the next upload of ufw. Thanks again and have a great day. :) -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#646865: backuppc: [PATCH] fix related issue to CVE-2011-3361 in CGI/View.pm

2011-10-27 Thread Jamie Strandboge
Package: backuppc Version: 3.2.1-1 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: XSS in CGI/View.pm

Bug#686248: race condition in ufw

2015-08-20 Thread Jamie Strandboge
Thank you for reporting this bug. This is a feature request and is being tracked in: https://bugs.launchpad.net/ufw/+bug/1204579 -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#833234: openvpn-blacklist: diff for NMU version 0.5+nmu1

2016-11-10 Thread Jamie Strandboge
ell me if I > should delay it longer. > > Regards. Thanks! This looks good to me. -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#858571: cups: Sync Ubuntu AppArmor profile from zesty

2017-03-23 Thread Jamie Strandboge
Package: cups Version: 2.2.2-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu zesty ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * debian/local/apparmor-profile: - allow cupsd and cups-pdf to com

Bug#859072: Contribute extended dep8 testing

2017-05-03 Thread Jamie Strandboge
On Thu, 2017-04-27 at 14:52 +0200, Christian Ehrhardt wrote: > > @Marc / Jamie - if you could ack publicly to the re-licensing here that > would be great. Feel free to relicense to GPLv2+. -- Jamie Strandboge | http://www.canonical.com signature.asc Description:

Bug#783251: ufw: Ufw autostarts wrongly by itself after Wheezy > Jessie upgrade

2015-07-20 Thread Jamie Strandboge
log, syslog and other details). Thanks -- Jamie Strandboge http://www.ubuntu.com/ getinfo.sh Description: application/shellscript signature.asc Description: OpenPGP digital signature

Bug#783251: ufw: Ufw autostarts wrongly by itself after Wheezy > Jessie upgrade

2015-07-22 Thread Jamie Strandboge
On 07/20/2015 03:01 PM, Jamie Strandboge wrote: > On 07/17/2015 03:27 PM, Quentin Berling wrote: >> Hi, >> I'm still having the problem. >> I just did : >> # ufw disable >> # reboot >> # ufw status >> ERROR: problem running ip6tables > > I

Bug#783251: ufw: Ufw autostarts wrongly by itself after Wheezy > Jessie upgrade

2015-07-17 Thread Jamie Strandboge
I'm sorry for responding to this now. http://privatepaste.com/97f2611c62 is no longer available. Are you still having the problem? If so, can you provide the output of: # /usr/share/ufw/check-requirements Thank you -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#792753: ufw: Add IGMP as a valid protocol

2015-07-20 Thread Jamie Strandboge
minor patch just permits igmp. > > Note if you add a port to igmp ufw tries to add the rule but iptables > complains. This is the same problem/feature as for protocols such as > ESP. > Thanks for the bug. FYI, this was fixed in r875 a few days ago and will be in u

Bug#656451: [pkg-apparmor] Bug#656451: apparmor-profiles: unowned files after purge (policy 6.8, 10.8)

2015-06-09 Thread Jamie Strandboge
it doesn't exist and then leave it alone thereafter (this way the admin can modify this file rather than the profile in /etc/apparmor.d, which is a conffile). That said, purge should remove them and if it doesn't it should be fixed. -- Jamie Strandboge | http://www.ubuntu.com signature.asc Description: OpenPGP digital signature

Bug#788577: libseccomp: add some autopkgtests

2015-06-12 Thread Jamie Strandboge
Package: libseccomp Version: 2.2.1-1 Severity: wishlist Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu wily ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: - add autopkgtests Thanks for considering the patch. -- Syst

Bug#764405: docker.io: update AppArmor policy for newer AppArmor

2014-10-07 Thread Jamie Strandboge
bian/patches/sync-apparmor-with-lxc.patch --- docker.io-1.2.0~dfsg1/debian/patches/sync-apparmor-with-lxc.patch 1969-12-31 18:00:00.0 -0600 +++ docker.io-1.2.0~dfsg1/debian/patches/sync-apparmor-with-lxc.patch 2014-10-01 13:23:40.00000 -0500 @@ -0,0 +1,173 @@ +Author: Jamie Strandboge +

Bug#777150: ufw: Hi, adde a custom rule with geoip iptables modules wont load from ufw.

2015-02-20 Thread Jamie Strandboge
source-country KR,CN,IN,RU,TR,VN,UA,BR,VE,JP ufw-user-input all -- 0.0.0.0/00.0.0.0/0 Note, I was thinking you might need to add xt_geoip to IPT_MODULES in /etc/default/ufw, but they seemed to have autoloaded fine on boot. -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#767117: ufw: default settings after install block all connectivity

2015-02-20 Thread Jamie Strandboge
Thanks for the bug report. What is the output of: # /usr/share/ufw/check-requirements -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#770453: ufw: [INTL:pt_BR] Brazilian Portuguese debconf templates translation

2015-02-20 Thread Jamie Strandboge
Thank you for the translation. This has been added to bzr and will be in the next upload. -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#797020: ufw: FTBFS: False is not true

2015-08-27 Thread Jamie Strandboge
cible.debian.net/logs/unstable/amd64/ufw_0.34-1.build1.log.gz > > Huh, this worked in a sid schroot and in the Ubuntu sync to wily. I'll take a look and get this fixed up. Thanks for the report! -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#798100: ufw: rsyslog warning: ~ action is deprecated, consider using the 'stop' statement instead

2015-09-08 Thread Jamie Strandboge
Thanks for filing the bug and submitting the patch. This will be fixed in 0.34-3 -- Jamie Strandboge http://www.ubuntu.com/ signature.asc Description: OpenPGP digital signature

Bug#788577: libseccomp: add some autopkgtests

2015-06-16 Thread Jamie Strandboge
On 06/16/2015 12:38 PM, Kees Cook wrote: > On Fri, Jun 12, 2015 at 04:01:39PM -0500, Jamie Strandboge wrote: >> In Ubuntu, the attached patch was applied to achieve the following: >> >> - add autopkgtests >> >> Thanks for considering the patch. > > H

Bug#768357: [pkg-apparmor] Bug#768357: Dovecot: Installing apparmor completely breaks dovecot as profiles do not match dovecot processes.

2014-11-06 Thread Jamie Strandboge
k empty, try 'dmesg | grep DEN') Thanks! -- Jamie Strandboge | http://www.ubuntu.com signature.asc Description: OpenPGP digital signature

Bug#765583: cups-filters: adjust apparmor policy for /etc/cups/lpoptions

2014-10-16 Thread Jamie Strandboge
Package: cups-filters Version: 1.0.57-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * debian/apparmor/usr.sbin.cups-browsed: allow read on /etc/cups/l

Bug#818000: Configuration files stored in /lib/ufw; FHS violation

2016-03-15 Thread Jamie Strandboge
n33.5.1-2 > pn  python3:any > ii  ucf3.0035 > > ufw recommends no packages. > > Versions of packages ufw suggests: > ii  rsyslog  8.16.0-1 > > -- debconf information excluded -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#764405: docker.io: update AppArmor policy for newer AppArmor

2014-12-19 Thread Jamie Strandboge
On 12/18/2014 11:32 PM, Tianon Gravi wrote: > On 7 October 2014 at 13:45, Jamie Strandboge wrote: >> Now, Ubuntu had dbus, signal, ptrace and unix mediation whereas Debian does >> not yet (this is is part of the upcoming AppArmor 2.9 and the corresponding >> kernel patches

Bug#830502: [pkg-apparmor] Bug#830502: apparmor-profiles: Reconsider what profiles are shipped in /etc/apparmor.d/ and in which mode

2017-08-11 Thread Jamie Strandboge
;t without its problems, but wanted to clarify this point wrt Ubuntu at least. -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#875808: usbguard: does not work with 4.13 kernel

2017-09-14 Thread Jamie Strandboge
Package: usbguard Version: 0.7.0+ds1-1 Severity: normal Dear Maintainer, I tried usbguard in Ubuntu 17.10 with the proposed 4.13 kernel and found 'usbguard generate-policy' didn't work: ERROR: UEventDeviceManager: present devices: enumeration timeout I then found: https://github.com/dkopecek/us

Bug#874782: UFW build error: AssertionError: not thrown

2017-09-15 Thread Jamie Strandboge
reproduce this in an up to date sid chroot: test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase) Test get_netfilter_capabilities() ... ok Can you provide more details (eg, how you fetched the source, changes you made, exact command used to lead to the error, etc). Thanks! -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#875808: usbguard: does not work with 4.13 kernel

2017-09-18 Thread Jamie Strandboge
Package: usbguard Version: 0.7.0+ds1-1 Followup-For: Bug #875808 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu artful ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/bug875808.patch: fix UEventDeviceManager to wor

Bug#829269: ufw: fails with ERROR: initcaps, dmesg: ip6_tables: disagrees about version of symbol xt_compat_match_from_user in a fresh install

2016-07-25 Thread Jamie Strandboge
retitle 829269 dmesg: ip6_tables: disagrees about version of symbol xt_compat_match_from_user in a fresh install reassign 829269 iptables thanks I can't reproduce this on testing either but based on the report it seems this would be better reported against iptables since that is the package that i

Bug#826218: [pkg-apparmor] Bug#826218: Bug#826218: Bug#826218: Complain still interferes

2016-07-30 Thread Jamie Strandboge
er a profile (even if it is super strict or lenient), you can replace that profile and have it apply to the running process. The man page is not at all clear on this point and that is a bug in the man page. -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#805002: [pkg-apparmor] Bug#805002: libvirt-client: "virsh attach-disk" fails with AppArmor enabled

2016-07-30 Thread Jamie Strandboge
rmor security policy. I haven't looked at qemu:///session in ages, but back when I did, a separate libvirtd ran as the user was used for 'session' (as opposed to the root running one for 'system') and as a result it should not be trying to modify the policy at all (it doe

Bug#849628: ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'

2017-01-08 Thread Jamie Strandboge
rom /etc/services for ssh/udp. Before: $ grep ssh /etc/services  ssh 22/tcp # SSH Remote Login Protocol ssh 22/udp Now: $ grep ssh /etc/services.dpkg-new  ssh 22/tcp # SSH Remote Login Protocol -- Jamie Strandboge | http://www.canonical.com signature.asc Description: This is a digitally signed message part

Bug#849628: ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'

2017-01-08 Thread Jamie Strandboge
On Sun, 2017-01-08 at 07:39 -0600, Jamie Strandboge wrote: > On Thu, 2016-12-29 at 09:10 +, Chris Lamb wrote: > >   Command '--dry-run allow ssh/udp' exited with '1', but expected '0' > >   ** FAIL ** FYI, this is now fixed in trunk and this w

Bug#1034568: binascii.Error: Odd-length string when asking the status

2023-05-01 Thread Jamie Strandboge
Thank you for the report. If you update hex_decode() in /usr/lib/python3/dist-packages/ufw/util.py to use this: return binascii.unhexlify('%2s' % h).decode("utf-8") instead of: return binascii.unhexlify(h).decode("utf-8") Does it resolve the issue for you? -- Email: ja...@strandboge.c

Bug#1034119: [INTL:ro] Translation of "ufw" to Romanian

2023-05-01 Thread Jamie Strandboge
Thanks for this! I plan to add this in the next ufw release and then push that to Debian with the next upload. -- Email: ja...@strandboge.com IRC: jdstrand

Bug#1033758: [INTL:ro] Romanian debconf templates translation of ufw

2023-05-01 Thread Jamie Strandboge
Thanks for this! It will be in the next upload. -- Email: ja...@strandboge.com IRC: jdstrand

Bug#1034568: binascii.Error: Odd-length string when asking the status

2023-05-02 Thread Jamie Strandboge
On Tue, 02 May 2023, Jamie Strandboge wrote: > Don't worry about the above, I have a better mitigation to avoid tracing > back: > https://git.launchpad.net/ufw/commit/?id=a14ab9777cde6308724164f5c42d368d2a823b3a Sorry, this is the correct commit: https://git.launchpad.net/

Bug#1034568: binascii.Error: Odd-length string when asking the status

2023-05-02 Thread Jamie Strandboge
On Mon, 01 May 2023, Jamie Strandboge wrote: > Thank you for the report. If you update hex_decode() in > /usr/lib/python3/dist-packages/ufw/util.py to use this: > > return binascii.unhexlify('%2s' % h).decode("utf-8") > > instead of: > >

Bug#1034568: binascii.Error: Odd-length string when asking the status

2023-05-02 Thread Jamie Strandboge
On Tue, 02 May 2023, Marek Küthe wrote: > Hello, > > thank you for the answer. > > I must admit that I was a bit hasty in reporting this error. This error > occurred when I tried to automate my ufw firewall rules with ansible. > In doing so, I had unfortunately run several scripts which inserted

Bug#1035497: ufw: Deny forwarding but still forward ping requests

2023-05-05 Thread Jamie Strandboge
Hi, Thank you for your report. By default, ufw adds rules for icmp echo-request to the host *before* 'user rules' in /etc/ufw/before.rules and /etc/ufw/before6.rules. This is why the 'ufw route deny' rules aren't affecting the ping request behavior. This is expected behavior. However, modifying

Bug#1036306: unblock: ufw/0.36.2-1

2023-05-18 Thread Jamie Strandboge
args (LP: #1965462) + * src/backend.py: add get_rules_ipv4() and get_rules_ipv6() (LP: #1951018) + * tests/check-requirements: update for python 3.10+ + * tests/root: normalize 'ACCEPT {all,tcp}' and 'ACCEPT N' for newer systems + + -- Jamie Strandboge Thu, 18 May 2023 08:45

Bug#1036307: unblock: ufw/0.36.2-1

2023-05-18 Thread Jamie Strandboge
Package: release.debian.org This has additional information: https://alioth-lists.debian.net/pipermail/piuparts-devel/2023-May/009566.html On May 18, 2023 10:33:36 PM Jamie Strandboge wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags

Bug#1036306: unblock: ufw/0.36.2-1

2023-05-23 Thread Jamie Strandboge
On Tue, 23 May 2023, Paul Gevers wrote: > > Bug fixes and translations will not be available in bookworm (I am upstream > > ufw > > and I cut 0.36.2 specifically for bookworm users). > > Please elaborate. It's Full Freeze time. A new upstream needs a lot of > defending to be considered a targete

Bug#447764: [php-maint] Bug#447764: Bug#447764: libapache2-mod-php5: updated debdiff

2008-02-01 Thread Jamie Strandboge
On Thu, 10 Jan 2008, sean finney wrote: > also, along the "out of the box" lines, perhaps it would be good to split out > the authentication information into an include file shipped in /etc (or maybe > dump the entire file in /etc...)? i.e. do we want to ship a default config > of attempting t

Bug#464244: ip6tables formatting error

2008-02-05 Thread Jamie Strandboge
Package: iptables Version: 1.3.8.0debian1-1 Severity: normal Tags: patch User: [EMAIL PROTECTED] Usertags: origin-ubuntu hardy ubuntu-patch ip6tables improperly displays the destination address when the address is longer than 18 characters. Here is example output: # ip6tables -L -n ... DROP

Bug#455906: fail2ban: Attacks against valid users don't get caught

2007-12-12 Thread Jamie Strandboge
Package: fail2ban Version: 0.8.1-3 Severity: normal Forwarding the ubuntu bug here. fail2ban fails to catch failed login attempts for valid users. Example line of my /var/log/auth.log that didn't get matched: Oct 13 10:16:34 tardis sshd[18845]: Failed password for nighty from 87.238.161.11 po

Bug#503318: gtk-vnc: [PATCH] ungrab when in absolute pointer mode doesn't work

2008-10-24 Thread Jamie Strandboge
shutting the machine down via virsh. Jamie Strandboge -- System Information: Debian Release: lenny/sid APT prefers intrepid-updates APT policy: (500, 'intrepid-updates'), (500, 'intrepid-security'), (500, 'intrepid') Architecture: amd64 (x86_64) Kernel: Linux

Bug#506344: ruby1.8 package breaks short-named constants

2008-11-20 Thread Jamie Strandboge
an/patches/905_short_named_constants.dpatch +++ ruby1.8-1.8.7.72/debian/patches/905_short_named_constants.dpatch @@ -0,0 +1,48 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 905_short_named_constants.dpatch by Jamie Strandboge <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are

Bug#509106: libvirt vulnerable to CVE-2008-5086

2008-12-18 Thread Jamie Strandboge
Package: libvirt Version: 0.4.6-5 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu jaunty ubuntu-patch In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: fix privilege escalation due to missing read only connectio

Bug#509593: libgnutls26: ldap-utils fails with 'TLS: peer cert untrusted or revoked (0x82)' with latest gnutls26

2008-12-23 Thread Jamie Strandboge
Package: libgnutls26 Version: 2.4.2-4 Severity: normal This was found as a result of the Ubuntu update to gnutls. This also affects the Ubuntu development release (which has the same version of gnutls26 as sid) and of course Debian Sid. For more information, please see: https://launchpad.net/bugs

Bug#507633: libgnutls26: GnuTLS does not know VeriSign any more

2008-12-05 Thread Jamie Strandboge
Hi, At Ubuntu, we encountered this bug after performing a security update, which includes the patch from 2.6.1 and 2.6.2. These upstream patches are also what are in sid's 2.4.2-3. This affects more than just Verisign, and seems the cause is when the last certificate in the chain is a self-signed

Bug#523213: /etc/cron.daily/apt does not check return code of date

2009-04-08 Thread Jamie Strandboge
Package: apt Version: 0.7.20.2 Severity: grave Tags: security patch Justification: user security hole The following is also being sent to oss-secur...@lists.openwall.com for a CVE request. Summary --- Systems in certain timezones with automatic updates enabled won't be upgraded on the first d

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-02 Thread Jamie Strandboge
gtk debconf deficiency. Everything else looks excellent and is a great improvement over what existed before. Thanks again for your work on this! :) Jamie -- Jamie Strandboge | http://www.canonical.com signature.asc Description: Digital signature

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-04 Thread Jamie Strandboge
s, I am fine with making the change, but I wanted to point our > > the gtk debconf deficiency. > > As long as you're happy with Christian's rationale for this one, I'll > leave it as it is (I wasn't involved with the Installer discussions so > my experience is limited here). > This is fine by me since it works better in more situations. Jamie -- Jamie Strandboge | http://www.canonical.com signature.asc Description: Digital signature

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-04 Thread Jamie Strandboge
o debconf translations-- am I able to change the textwidth without messing up translations? Thanks again for you help on this! :) Jamie -- Jamie Strandboge | http://www.canonical.com signature.asc Description: Digital signature

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-04 Thread Jamie Strandboge
On Thu, 04 Jun 2009, Jamie Strandboge wrote: > + You should read the ufw(1) manpage for details about ufw configuration. > Oops, this should be 'ufw(8)' (ufw is a system administration command). Jamie -- Jamie Strandboge | http://www.canonical.com signature

Bug#506215: (no subject)

2009-05-08 Thread Jamie Strandboge
-- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#506215: (no subject)

2009-05-08 Thread Jamie Strandboge
-- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#506215: (no subject)

2009-05-08 Thread Jamie Strandboge
-- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#506215: RFP: ufw -- Uncomplicated Firewall (ufw) is a firewall that is designed to be easy to use. It uses a command line interface consisting of a small number of simple commands, and uses iptabl

2009-05-08 Thread Jamie Strandboge
This is actively being worked on and an initial upload should occur today or tomorrow. Jamie -- Jamie Strandboge | http://www.canonical.com signature.asc Description: Digital signature

Bug#528434: cron: Incomplete fix for CVE-2006-2607 (setgid() and initgroups() not checked)

2009-05-12 Thread Jamie Strandboge
Package: cron Version: 3.0pl1-105 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu jaunty ubuntu-patch Hi, I was reviewing a list of old bugs in the Ubuntu bug tracker, and came across: https://bugs.edge.launchpad.n

Bug#536790: debian-policy: please clarify 'required target' in section 4.9

2009-07-13 Thread Jamie Strandboge
Package: debian-policy Severity: wishlist Section 4.9 of http://www.debian.org/doc/debian-policy/ch-source.html states that there a number of required targets for debian/rules. Specifically: "This file must be an executable makefile, and contains the package-specific recipes for compiling the pac

Bug#536790: debian-policy: please clarify 'required target' in section 4.9

2009-07-13 Thread Jamie Strandboge
ording. Perhaps using 'implemented' for the required targets would be sufficiently clear. Perhaps: "At a minimum, required targets must be implemented by debian/rules and are the ones called by dpkg-buildpackage, namely, clean, binary, binary-arch, binary-indep, and build." Jamie -- Jamie Strandboge | http://www.ubuntu.com signature.asc Description: Digital signature

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-08 Thread Jamie Strandboge
between > Samba and CIFS) "CIFS (Samba)" > Considering this, how about the following: - __Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW (Secure) + __Choices: CUPS, DNS, IMAP (secure), POP3 (secure), SSH, CIFS (Samba), SMTP, HTTP, HTTP (secure) It is

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-12 Thread Jamie Strandboge
es not hurt usability. How about: - __Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW (Secure) + __Choices: CUPS, DNS, IMAPs, POP3s, SSH, CIFS (Samba), SMTP, HTTP, HTTPS I realize that HTTPS doesn't go with IMAPs and POP3s, but HTTPs just looked wrong. Jamie -- Jamie Strandboge | http://www.canonical.com signature.asc Description: Digital signature

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-16 Thread Jamie Strandboge
On Sat, 13 Jun 2009, Jonathan Wiltshire wrote: > Jamie: once this is resolved, are all other outstanding objections > covered now? > I believe so, but would like to see the final diff to be sure. Thanks! Jamie -- Jamie Strandboge | http://www.canonical.com sign

Bug#530956: ufw: [debconf_rewrite] Debconf templates review

2009-06-16 Thread Jamie Strandboge
On Tue, 16 Jun 2009, Jonathan Wiltshire wrote: > Patch attached for your review. If you're happy, please ACK it and I > will start a translation round. > Looks good to me. Thanks for all the work on this! Jamie -- Jamie Strandboge | http://www.canonical.com

Bug#530956: ufw: General update after the debconf review process

2009-06-29 Thread Jamie Strandboge
t needs some adjustments before these can be rolled out. Thanks! Jamie -- Jamie Strandboge | http://www.ubuntu.com signature.asc Description: Digital signature

Bug#443891: elinks: patch for CVE-2007-5034

2007-09-24 Thread Jamie Strandboge
Package: elinks Severity: normal Tags: patch See: http://bugzilla.elinks.cz/show_bug.cgi?id=937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5034 https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018 Jamie Strandboge -- Email: [EMAIL PROTECTED] IRC (freenode): jdstrand diff

Bug#538383: [INTL:gl] ufw debconf translation update

2009-07-25 Thread Jamie Strandboge
n't include the Galician translation in the original round of translations. There is a typo in the untranslated text (I've contacted the other already). Can you resubmit, retranslating with the above line as: > #. Type: error > #. Description > #: ../templates:2001 > ms

Bug#538336: [INTL:sv] Swedish strings for ufw debconf

2009-07-25 Thread Jamie Strandboge
As the request for the translation update was done in error, I am going to keep the original translation and close out this bug. Sorry for the inconvenience. -- Jamie Strandboge | http://www.ubuntu.com -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a

Bug#471737: mysql-dfsg-5.0: ORDER BY not working with GROUP BY (upstream bug #32202)

2008-03-19 Thread Jamie Strandboge
patches/92_fix_order_by32202.dpatch +++ mysql-dfsg-5.0-5.0.51a/debian/patches/92_fix_order_by32202.dpatch @@ -0,0 +1,147 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 92_fix_order_by32202.dpatch by Jamie Strandboge <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are a de

Bug#486502: multiple vulnerabilities found in vim

2008-06-16 Thread Jamie Strandboge
Package: vim Version: 1:7.1.314-2 Severity: grave Tags: security Justification: user security hole Forwarding the following, which was just pointed out to me: http://www.rdancer.org/vulnerablevim.html http://www.reddit.com/r/programming/info/6ng40/comments/ -- To UNSUBSCRIBE, email to [EMAIL

Bug#486502: multiple vulnerabilities found in vim

2008-06-16 Thread Jamie Strandboge
These should all be fixed now according to: http://groups.google.com/group/vim_dev/tree/browse_frm/month/2008-06/6d7899eac89aa333?rnum=131&_done=%2Fgroup%2Fvim_dev%2Fbrowse_frm%2Fmonth%2F2008-06%3F#doc_9bb6550f4f955f04 Also, 7.1.314 is supposedly mostly not affected, but I did find these commits:

Bug#445924: [PATCH] manedit: segfaults when trying to make a new manpage

2008-06-19 Thread Jamie Strandboge
tches/08_new_segv.dpatch @@ -0,0 +1,37 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 08_new_segv.dpatch by Jamie Strandboge <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: No description. + [EMAIL PROTECTED]@ +diff -urNad manedit-0.8.1~/manedit/ed

Bug#487152: [wishlist] openssl.cnf should use default_bits = 2048

2008-06-19 Thread Jamie Strandboge
Package: openssl Version: 0.9.8g-4ubuntu3.1 Severity: wishlist As we are approaching a time when 1024 bits is not going to be long enough, it might be a good idea to consider changing openssl.cnf to have: [ req ] default_bits= 2048 Interestingly, while it is currently 1024, the man

  1   2   >