@Bernd, I owe you a beer ;P
I was reviewing the code and I found another shell injection in the IP & Ports 
:(
I'm attaching the patchs for all the affected versions and I'm sending the new 
version 15.04.2 to the maintainers.
Best regards and thanks Bernd!

** Patch removed: "Patchs for Gufw 14.04.2 & 14.10.1"
   
https://bugs.launchpad.net/gui-ufw/+bug/1410839/+attachment/4301088/+files/patchs_14.04.2_and_14.10.1.tar.gz

** Attachment added: "patchs.tar.gz"
   
https://bugs.launchpad.net/gui-ufw/+bug/1410839/+attachment/4301935/+files/patchs.tar.gz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1410839

Title:
  Shell Command injection in ufw_backend.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/gui-ufw/+bug/1410839/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to