; Jamie, what do you think about this?
>
I agree that it is awkward to have them in different places, which is why it is
the way it is now (and has been this way upstream and in Ubuntu for years--
which isn't a point to not fix things, just saying it isn't a new problem).
libvirt w
Thanks for the bug and I'll get this fixed in the next upload. Note that in the
normal upgrade case, python-ufw will not be pulled in as part of the upgrade
because ufw itself does not depend on it so it doesn't get pulled in as part of
the upgrade (which is why I've not seen this bug before now).
Package: open-iscsi
Version: 2.0.873-3
Severity: normal
Forwarding LP: #1268240 from Ubuntu:
"/etc/iscsi/iscsid.conf is world readable but it may contain CHAP credentials.
This affects at least Precise and Saucy."
I also confirmed this on 14.04 (2.0.873-3ubuntu7). This is arguably a security
bu
Package: openjdk-6
Version: 6b30-1.13.1-1
Severity: serious
Tags: patch
Justification: fails to build from source (but built successfully in the past)
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu trusty ubuntu-patch
Dear Maintainer,
In preparing security updates for older releases
Package: libnss3-1d
Version: 3.12.8-1+squeeze6
Severity: grave
Tags: security
Justification: user security hole
-- System Information:
Debian Release: 6.0.6
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Versions of packages libnss3-1d depends on:
ii libc6
Package: suricata
Version: 1.4-3
Severity: wishlist
Tags: patch
Dear Maintainer,
It would be nice if you could set in /etc/default/suricata:
LISTENMODE=af-packet
Attached is a patch to do that.
Also, the start-stop-daemon in 'stop' seems extraneous. It was not working
right via cron so I commen
Package: python-django
Version: 1.4.2-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu raring ubuntu-patch
Dear Maintainer,
1.4.2-1 introduced testsuite fixes for the patches to fix CVE-2012-4520. This
breaks 'manage.py test' when ADMINS or MANAGERS is se
Package: t1lib
Version: 5.1.2-3.4
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* SECURITY UPDATE: fix
Package: libxml2
Version: 2.7.8.dfsg-5.1
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* SECURITY UPDAT
Package: rsyslog
Version: 5.8.6-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
Dear Maintainer,
I'd like for you to consider applying the attached patch to achieve the
following:
* debian/rsyslog.conf: set $WorkDirectory to /var/
On Fri, 2012-02-03 at 15:23 +0100, Jeroen Schot wrote:
> Hello,
>
> Attached is the Dutch translation of the ufw debconf templates.
> Please include it in your next upload.
Hi! Thanks for this translation. Has someone from debian-l10n-dutch had
a chance to review this?
signature.asc
Descriptio
On Fri, 2012-02-03 at 16:55 +0100, Jeroen Schot wrote:
> On Fri, Feb 03, 2012 at 09:33:49AM -0600, Jamie Strandboge wrote:
> > On Fri, 2012-02-03 at 15:23 +0100, Jeroen Schot wrote:
> > > Attached is the Dutch translation of the ufw debconf templates.
> > > Please inc
ptables
that is compiled with gcc-4.7. Specifically:
http://bugzilla.netfilter.org/show_bug.cgi?id=774
https://bugs.launchpad.net/ubuntu/+source/iptables/+bug/1027252
Upstream has not decided on a fix yet, so I did not forward the patch to
Debian yet.
--
Jamie Strandboge | http://www.canon
way of
+anything and are gone after the next reboot. Using upstream's ufw-init has
+the important benefit of always cleaning what it needs. (Closes: 672439).
+- debian/prerm: call '/lib/ufw/ufw-init stop' on removal
+- debian/postrm: don't flush the chains on pur
.3/debian/patches/02_require-cert-verification.patch 2012-09-06 16:15:25.0 -0500
@@ -0,0 +1,18 @@
+Author: Jamie Strandboge
+Description: require SSL certificate validation by default by using
+ CERT_REQUIRED and using the system /etc/ssl/certs/ca-certificates.crt
+Bug-Ubuntu: https://lau
Package: virt-viewer
Version: 0.4.1-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
In Ubuntu, the attached patch was applied to achieve the following:
* 0003-set-window-title-with-domain-name.patch: set window title to use
dom
Package: honeyd
Version: 1.5c-8
Followup-For: Bug #632484
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu oneiric ubuntu-patch
*** /tmp/tmpNjoEKf
In Ubuntu, the attached patch was applied to achieve the following:
[ Steve Langasek ]
* configure.in: Fix wrong attempt to use dlsym
> ERROR: problem running ufw-init
>
Seems like the kernel doesn't support everything that is required by ufw. You
can use '/usr/share/ufw/check-requirements' (as root) to see.
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
FYI,
Ubuntu fixed this here:
http://www.ubuntu.com/usn/usn-1911-1/
Attached is the debdiff used for Ubuntu 12.04 LTS, which is based on Debian's
2.2+git20110628-2.
--
Jamie Strandboge http://www.ubuntu.com/
diff -Nru lcms2-2.2+git20110628/debian/changelog
lcms
FYI, this now has a CVE (CVE-2011-4103) amd looks to be fixed in
0.2.2-2:
python-django-piston (0.2.2-2) unstable; urgency=low
[ Michael Ziegler ]
* Bump Standards Version to 3.9.2.
* Remove reference to /usr/share/common-licenses/BSD and strip trailing
whitespace in copyright.
* Fix
but expected '1'
> ** FAIL **
Yes, this is https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/947224
and fixed in 0.31. I will be preparing an upload for Debian soon.
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
On Wed, 2012-03-21 at 19:34 +0530, Ritesh Raj Sarraf wrote:
> On Tuesday 20 March 2012 09:14 PM, Jamie Strandboge wrote:
> > It isn't ufw that is doing the logging, it is the kernel via netfilter.
> > As such, logged policy vilations cannot be removed by ufw. For kern.log,
Package: backuppc
Version: 3.2.1-2
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* SECURITY UPDATE: XSS
Package: raptor
Version: 1.4.21-7
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch
Dear Maintainer,
While 1.4.21-7 claims to fix CVE-2012-0037, it does not because
debian/patches/series was not
Package: apt
Version: 0.9.6
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* adjust apt-key to ensure no collisions on subkeys too. Patch thanks t
d in the next upload
of ufw. Thanks again and have a great day. :)
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
Package: backuppc
Version: 3.2.1-1
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
In Ubuntu, the attached patch was applied to achieve the following:
* SECURITY UPDATE: XSS in CGI/View.pm
Thank you for reporting this bug. This is a feature request and is being
tracked in:
https://bugs.launchpad.net/ufw/+bug/1204579
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
ell me if I
> should delay it longer.
>
> Regards.
Thanks! This looks good to me.
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
Package: cups
Version: 2.2.2-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu zesty ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* debian/local/apparmor-profile:
- allow cupsd and cups-pdf to com
On Thu, 2017-04-27 at 14:52 +0200, Christian Ehrhardt wrote:
>
> @Marc / Jamie - if you could ack publicly to the re-licensing here that
> would be great.
Feel free to relicense to GPLv2+.
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description:
log, syslog and other
details).
Thanks
--
Jamie Strandboge http://www.ubuntu.com/
getinfo.sh
Description: application/shellscript
signature.asc
Description: OpenPGP digital signature
On 07/20/2015 03:01 PM, Jamie Strandboge wrote:
> On 07/17/2015 03:27 PM, Quentin Berling wrote:
>> Hi,
>> I'm still having the problem.
>> I just did :
>> # ufw disable
>> # reboot
>> # ufw status
>> ERROR: problem running ip6tables
>
> I
I'm sorry for responding to this now. http://privatepaste.com/97f2611c62 is no
longer available. Are you still having the problem? If so, can you provide the
output of:
# /usr/share/ufw/check-requirements
Thank you
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
minor patch just permits igmp.
>
> Note if you add a port to igmp ufw tries to add the rule but iptables
> complains. This is the same problem/feature as for protocols such as
> ESP.
>
Thanks for the bug. FYI, this was fixed in r875 a few days ago and will be in
u
it doesn't
exist and then leave it alone thereafter (this way the admin can modify this
file rather than the profile in /etc/apparmor.d, which is a conffile). That
said, purge should remove them and if it doesn't it should be fixed.
--
Jamie Strandboge | http://www.ubuntu.com
signature.asc
Description: OpenPGP digital signature
Package: libseccomp
Version: 2.2.1-1
Severity: wishlist
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu wily ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
- add autopkgtests
Thanks for considering the patch.
-- Syst
bian/patches/sync-apparmor-with-lxc.patch
--- docker.io-1.2.0~dfsg1/debian/patches/sync-apparmor-with-lxc.patch 1969-12-31 18:00:00.0 -0600
+++ docker.io-1.2.0~dfsg1/debian/patches/sync-apparmor-with-lxc.patch 2014-10-01 13:23:40.00000 -0500
@@ -0,0 +1,173 @@
+Author: Jamie Strandboge
+
source-country KR,CN,IN,RU,TR,VN,UA,BR,VE,JP
ufw-user-input all -- 0.0.0.0/00.0.0.0/0
Note, I was thinking you might need to add xt_geoip to IPT_MODULES in
/etc/default/ufw, but they seemed to have autoloaded fine on boot.
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
Thanks for the bug report. What is the output of:
# /usr/share/ufw/check-requirements
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
Thank you for the translation. This has been added to bzr and will be in the
next upload.
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
cible.debian.net/logs/unstable/amd64/ufw_0.34-1.build1.log.gz
>
>
Huh, this worked in a sid schroot and in the Ubuntu sync to wily. I'll take a
look and get this fixed up. Thanks for the report!
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
Thanks for filing the bug and submitting the patch. This will be fixed in 0.34-3
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
On 06/16/2015 12:38 PM, Kees Cook wrote:
> On Fri, Jun 12, 2015 at 04:01:39PM -0500, Jamie Strandboge wrote:
>> In Ubuntu, the attached patch was applied to achieve the following:
>>
>> - add autopkgtests
>>
>> Thanks for considering the patch.
>
> H
k empty, try 'dmesg | grep
DEN')
Thanks!
--
Jamie Strandboge | http://www.ubuntu.com
signature.asc
Description: OpenPGP digital signature
Package: cups-filters
Version: 1.0.57-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* debian/apparmor/usr.sbin.cups-browsed: allow read on /etc/cups/l
n33.5.1-2
> pn python3:any
> ii ucf3.0035
>
> ufw recommends no packages.
>
> Versions of packages ufw suggests:
> ii rsyslog 8.16.0-1
>
> -- debconf information excluded
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
On 12/18/2014 11:32 PM, Tianon Gravi wrote:
> On 7 October 2014 at 13:45, Jamie Strandboge wrote:
>> Now, Ubuntu had dbus, signal, ptrace and unix mediation whereas Debian does
>> not yet (this is is part of the upcoming AppArmor 2.9 and the corresponding
>> kernel patches
;t without its problems, but wanted to clarify this point wrt
Ubuntu at least.
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
Package: usbguard
Version: 0.7.0+ds1-1
Severity: normal
Dear Maintainer,
I tried usbguard in Ubuntu 17.10 with the proposed 4.13 kernel and found
'usbguard generate-policy' didn't work:
ERROR: UEventDeviceManager: present devices: enumeration timeout
I then found:
https://github.com/dkopecek/us
reproduce this in an up to date sid chroot:
test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase)
Test get_netfilter_capabilities() ... ok
Can you provide more details (eg, how you fetched the source, changes you made,
exact command used to lead to the error, etc).
Thanks!
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
Package: usbguard
Version: 0.7.0+ds1-1
Followup-For: Bug #875808
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu artful ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* debian/patches/bug875808.patch: fix UEventDeviceManager to wor
retitle 829269 dmesg: ip6_tables: disagrees about version of symbol
xt_compat_match_from_user in a fresh install
reassign 829269 iptables
thanks
I can't reproduce this on testing either but based on the report it seems this
would be better reported against iptables since that is the package that i
er a profile (even if it is super strict or lenient), you can replace that
profile and have it apply to the running process. The man page is not at all
clear on this point and that is a bug in the man page.
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
rmor
security policy. I haven't looked at qemu:///session in ages, but back when I
did, a separate libvirtd ran as the user was used for 'session' (as opposed to
the root running one for 'system') and as a result it should not be trying to
modify the policy at all (it doe
rom /etc/services for ssh/udp. Before:
$ grep ssh /etc/services
ssh 22/tcp # SSH Remote Login
Protocol
ssh 22/udp
Now:
$ grep ssh /etc/services.dpkg-new
ssh 22/tcp # SSH Remote Login
Protocol
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
On Sun, 2017-01-08 at 07:39 -0600, Jamie Strandboge wrote:
> On Thu, 2016-12-29 at 09:10 +, Chris Lamb wrote:
> > Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
> > ** FAIL **
FYI, this is now fixed in trunk and this w
Thank you for the report. If you update hex_decode() in
/usr/lib/python3/dist-packages/ufw/util.py to use this:
return binascii.unhexlify('%2s' % h).decode("utf-8")
instead of:
return binascii.unhexlify(h).decode("utf-8")
Does it resolve the issue for you?
--
Email: ja...@strandboge.c
Thanks for this! I plan to add this in the next ufw release and then
push that to Debian with the next upload.
--
Email: ja...@strandboge.com
IRC: jdstrand
Thanks for this! It will be in the next upload.
--
Email: ja...@strandboge.com
IRC: jdstrand
On Tue, 02 May 2023, Jamie Strandboge wrote:
> Don't worry about the above, I have a better mitigation to avoid tracing
> back:
> https://git.launchpad.net/ufw/commit/?id=a14ab9777cde6308724164f5c42d368d2a823b3a
Sorry, this is the correct commit:
https://git.launchpad.net/
On Mon, 01 May 2023, Jamie Strandboge wrote:
> Thank you for the report. If you update hex_decode() in
> /usr/lib/python3/dist-packages/ufw/util.py to use this:
>
> return binascii.unhexlify('%2s' % h).decode("utf-8")
>
> instead of:
>
>
On Tue, 02 May 2023, Marek Küthe wrote:
> Hello,
>
> thank you for the answer.
>
> I must admit that I was a bit hasty in reporting this error. This error
> occurred when I tried to automate my ufw firewall rules with ansible.
> In doing so, I had unfortunately run several scripts which inserted
Hi,
Thank you for your report.
By default, ufw adds rules for icmp echo-request to the host *before*
'user rules' in /etc/ufw/before.rules and /etc/ufw/before6.rules. This
is why the 'ufw route deny' rules aren't affecting the ping request
behavior. This is expected behavior.
However, modifying
args (LP: #1965462)
+ * src/backend.py: add get_rules_ipv4() and get_rules_ipv6() (LP: #1951018)
+ * tests/check-requirements: update for python 3.10+
+ * tests/root: normalize 'ACCEPT {all,tcp}' and 'ACCEPT N' for newer systems
+
+ -- Jamie Strandboge Thu, 18 May 2023 08:45
Package: release.debian.org
This has additional information:
https://alioth-lists.debian.net/pipermail/piuparts-devel/2023-May/009566.html
On May 18, 2023 10:33:36 PM Jamie Strandboge wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags
On Tue, 23 May 2023, Paul Gevers wrote:
> > Bug fixes and translations will not be available in bookworm (I am upstream
> > ufw
> > and I cut 0.36.2 specifically for bookworm users).
>
> Please elaborate. It's Full Freeze time. A new upstream needs a lot of
> defending to be considered a targete
On Thu, 10 Jan 2008, sean finney wrote:
> also, along the "out of the box" lines, perhaps it would be good to split out
> the authentication information into an include file shipped in /etc (or maybe
> dump the entire file in /etc...)? i.e. do we want to ship a default config
> of attempting t
Package: iptables
Version: 1.3.8.0debian1-1
Severity: normal
Tags: patch
User: [EMAIL PROTECTED]
Usertags: origin-ubuntu hardy ubuntu-patch
ip6tables improperly displays the destination address when the address
is longer than 18 characters. Here is example output:
# ip6tables -L -n
...
DROP
Package: fail2ban
Version: 0.8.1-3
Severity: normal
Forwarding the ubuntu bug here.
fail2ban fails to catch failed login attempts for valid users. Example
line of my /var/log/auth.log that didn't get matched:
Oct 13 10:16:34 tardis sshd[18845]: Failed password for nighty from
87.238.161.11 po
shutting the machine down via virsh.
Jamie Strandboge
-- System Information:
Debian Release: lenny/sid
APT prefers intrepid-updates
APT policy: (500, 'intrepid-updates'), (500, 'intrepid-security'), (500,
'intrepid')
Architecture: amd64 (x86_64)
Kernel: Linux
an/patches/905_short_named_constants.dpatch
+++ ruby1.8-1.8.7.72/debian/patches/905_short_named_constants.dpatch
@@ -0,0 +1,48 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 905_short_named_constants.dpatch by Jamie Strandboge <[EMAIL PROTECTED]>
+##
+## All lines beginning with `## DP:' are
Package: libvirt
Version: 0.4.6-5
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu jaunty ubuntu-patch
In Ubuntu, we've applied the attached patch to achieve the following:
* SECURITY UPDATE: fix privilege escalation due to missing read only
connectio
Package: libgnutls26
Version: 2.4.2-4
Severity: normal
This was found as a result of the Ubuntu update to gnutls. This also
affects the Ubuntu development release (which has the same version of
gnutls26 as sid) and of course Debian Sid. For more information, please
see:
https://launchpad.net/bugs
Hi,
At Ubuntu, we encountered this bug after performing a security update,
which includes the patch from 2.6.1 and 2.6.2. These upstream patches
are also what are in sid's 2.4.2-3. This affects more than just Verisign,
and seems the cause is when the last certificate in the chain is a
self-signed
Package: apt
Version: 0.7.20.2
Severity: grave
Tags: security patch
Justification: user security hole
The following is also being sent to oss-secur...@lists.openwall.com for
a CVE request.
Summary
---
Systems in certain timezones with automatic updates enabled won't be
upgraded on the first d
gtk debconf deficiency.
Everything else looks excellent and is a great improvement over what
existed before. Thanks again for your work on this! :)
Jamie
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: Digital signature
s, I am fine with making the change, but I wanted to point our
> > the gtk debconf deficiency.
>
> As long as you're happy with Christian's rationale for this one, I'll
> leave it as it is (I wasn't involved with the Installer discussions so
> my experience is limited here).
>
This is fine by me since it works better in more situations.
Jamie
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: Digital signature
o debconf translations--
am I able to change the textwidth without messing up translations?
Thanks again for you help on this! :)
Jamie
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: Digital signature
On Thu, 04 Jun 2009, Jamie Strandboge wrote:
> + You should read the ufw(1) manpage for details about ufw configuration.
>
Oops, this should be 'ufw(8)' (ufw is a system administration command).
Jamie
--
Jamie Strandboge | http://www.canonical.com
signature
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
This is actively being worked on and an initial upload should occur
today or tomorrow.
Jamie
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: Digital signature
Package: cron
Version: 3.0pl1-105
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu jaunty ubuntu-patch
Hi,
I was reviewing a list of old bugs in the Ubuntu bug tracker, and came across:
https://bugs.edge.launchpad.n
Package: debian-policy
Severity: wishlist
Section 4.9 of http://www.debian.org/doc/debian-policy/ch-source.html
states that there a number of required targets for debian/rules.
Specifically:
"This file must be an executable makefile, and contains the
package-specific recipes for compiling the pac
ording. Perhaps using 'implemented' for the
required targets would be sufficiently clear. Perhaps:
"At a minimum, required targets must be implemented by debian/rules and
are the ones called by dpkg-buildpackage, namely, clean, binary,
binary-arch, binary-indep, and build."
Jamie
--
Jamie Strandboge | http://www.ubuntu.com
signature.asc
Description: Digital signature
between
> Samba and CIFS) "CIFS (Samba)"
>
Considering this, how about the following:
- __Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW,
WWW (Secure)
+ __Choices: CUPS, DNS, IMAP (secure), POP3 (secure), SSH, CIFS (Samba), SMTP,
HTTP, HTTP (secure)
It is
es not hurt usability. How about:
- __Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW,
WWW (Secure)
+ __Choices: CUPS, DNS, IMAPs, POP3s, SSH, CIFS (Samba), SMTP, HTTP, HTTPS
I realize that HTTPS doesn't go with IMAPs and POP3s, but HTTPs just
looked wrong.
Jamie
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: Digital signature
On Sat, 13 Jun 2009, Jonathan Wiltshire wrote:
> Jamie: once this is resolved, are all other outstanding objections
> covered now?
>
I believe so, but would like to see the final diff to be sure.
Thanks!
Jamie
--
Jamie Strandboge | http://www.canonical.com
sign
On Tue, 16 Jun 2009, Jonathan Wiltshire wrote:
> Patch attached for your review. If you're happy, please ACK it and I
> will start a translation round.
>
Looks good to me. Thanks for all the work on this!
Jamie
--
Jamie Strandboge | http://www.canonical.com
t needs some
adjustments before these can be rolled out.
Thanks!
Jamie
--
Jamie Strandboge | http://www.ubuntu.com
signature.asc
Description: Digital signature
Package: elinks
Severity: normal
Tags: patch
See:
http://bugzilla.elinks.cz/show_bug.cgi?id=937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5034
https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018
Jamie Strandboge
--
Email: [EMAIL PROTECTED]
IRC (freenode): jdstrand
diff
n't include the Galician translation in the
original round of translations. There is a typo in the untranslated
text (I've contacted the other already). Can you resubmit, retranslating
with the above line as:
> #. Type: error
> #. Description
> #: ../templates:2001
> ms
As the request for the translation update was done in error, I am going
to keep the original translation and close out this bug. Sorry for the
inconvenience.
--
Jamie Strandboge | http://www.ubuntu.com
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a
patches/92_fix_order_by32202.dpatch
+++ mysql-dfsg-5.0-5.0.51a/debian/patches/92_fix_order_by32202.dpatch
@@ -0,0 +1,147 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 92_fix_order_by32202.dpatch by Jamie Strandboge <[EMAIL PROTECTED]>
+##
+## All lines beginning with `## DP:' are a de
Package: vim
Version: 1:7.1.314-2
Severity: grave
Tags: security
Justification: user security hole
Forwarding the following, which was just pointed out to me:
http://www.rdancer.org/vulnerablevim.html
http://www.reddit.com/r/programming/info/6ng40/comments/
--
To UNSUBSCRIBE, email to [EMAIL
These should all be fixed now according to:
http://groups.google.com/group/vim_dev/tree/browse_frm/month/2008-06/6d7899eac89aa333?rnum=131&_done=%2Fgroup%2Fvim_dev%2Fbrowse_frm%2Fmonth%2F2008-06%3F#doc_9bb6550f4f955f04
Also, 7.1.314 is supposedly mostly not affected, but I did find these commits:
tches/08_new_segv.dpatch
@@ -0,0 +1,37 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 08_new_segv.dpatch by Jamie Strandboge <[EMAIL PROTECTED]>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: No description.
+
[EMAIL PROTECTED]@
+diff -urNad manedit-0.8.1~/manedit/ed
Package: openssl
Version: 0.9.8g-4ubuntu3.1
Severity: wishlist
As we are approaching a time when 1024 bits is not going to be long
enough, it might be a good idea to consider changing openssl.cnf to
have:
[ req ]
default_bits= 2048
Interestingly, while it is currently 1024, the man
1 - 100 of 194 matches
Mail list logo