@Bernd, I owe you a beer ;P I was reviewing the code and I found another shell injection in the IP & Ports :( I'm attaching the patchs for all the affected versions and I'm sending the new version 15.04.2 to the maintainers. Best regards and thanks Bernd!
** Patch removed: "Patchs for Gufw 14.04.2 & 14.10.1" https://bugs.launchpad.net/gui-ufw/+bug/1410839/+attachment/4301088/+files/patchs_14.04.2_and_14.10.1.tar.gz ** Attachment added: "patchs.tar.gz" https://bugs.launchpad.net/gui-ufw/+bug/1410839/+attachment/4301935/+files/patchs.tar.gz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1410839 Title: Shell Command injection in ufw_backend.py To manage notifications about this bug go to: https://bugs.launchpad.net/gui-ufw/+bug/1410839/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
