So there is one problem with this, upstream's symbol versioning is
broken in 1.0.2 and before, which is leaving the symbols in Debian
unversioned. Upstream has fixed this after 1.0.2 in the following
commits:
http://git.netfilter.org/nftables/commit/?id=1d507ce7f1d3c12481ee24bd1dcac2fc1984ee9f
Package: nftables
Version: 1.0.2-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu jammy ubuntu-patch
In Ubuntu, the attached patch was applied to detect and track API
changes to libnftables1.
* debian/libnftables1.symbols:
- create a symbols file t
o forward?
[1] At the end of the day, it's still quilt patches checked into a VCS.
But I'm not aware of any VCS that's good at keeping a patch series
or even multiple topic branches that aren't accepted (yet) upstream,
especially if you want to track the history of how individual
patches developed over time.
--
Steve Beattie
http://NxNW.org/~steve/
signature.asc
Description: PGP signature
Package: libclamunrar
Version: 0.99-4
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu artful ubuntu-patch
Dear Maintainer,
libclamunrar FTBFS when compiled against zlib 1.2.10 or newer, due to a
faulty configure check:
https://bugzilla.clamav.net/show_bug.
ractions/X needs an update,
> so I'm reassigning this bug to the package that ships that file.
Upstream apparmor has committed a fix for this that adds
owner /{,var/}run/user/*/X11/Xauthority r,
to abstractions/X.
Committed in trunk rev 3591, apparmor-2.10 branch rev 3367, and
apparmor-2.9 branch rev 3035.
Thanks for the report!
--
Steve Beattie
http://NxNW.org/~steve/
signature.asc
Description: PGP signature
main (argc=, argv=) at
lshd.c:1278
mode = DAEMON_NORMAL
resources = 0x557c045d0010
keys = 0x557c045d0050
fds =
r = {rlim_cur = 18446744073709551615, rlim_max = 18446744073709551615}
Thanks!
--
Steve Beattie
http://NxNW.org/~steve/
signature.asc
Description: PGP signature
oughts? In particular, I'd like to know what Ubuntu folks think
> about that, so we can pick a solution we can share :)
Option (a) looks good to me, I don't see any problems with it. Thanks!
--
Steve Beattie
http://NxNW.org/~steve/
signature.asc
Description: PGP signature
Hello Daniele,
On Fri, Mar 20, 2015 at 12:33:20AM +0100, Daniele Tricoli wrote:
> On Monday 16 March 2015 19:03:55 Steve Beattie wrote:
> > Also note that upstream, as of the v0.4.0 release, has switched to using
> > the cryptography python module instead of PyCrypto.
>
> I
Source: pyjwt
Version: 0.2.1-1
Severity: normal
Dear Maintainer,
According to
http://self-issued.info/docs/draft-jones-json-web-token-01.html ,
a jwt implementation is required to support RSA signatures in order
to be conforming. In order for pyjwt to support RSA signatures, the
relevant version
Beattie
http://NxNW.org/~steve/
revno: 2830
fixes bug: https://launchpad.net/bugs/1399027
committer: Steve Beattie
branch nick: apparmor
timestamp: Fri 2014-12-12 16:43:35 -0800
message:
library: fix parsing for yet another format
in/passwd mr,
/usr/lib/pwdutils/lib*.so* mr,
/usr/lib64/pwdutils/lib*.so* mr,
/usr/share/cracklib/pw_dict.hwm r,
/usr/share/cracklib/pw_dict.pwd r,
/usr/share/cracklib/pw_dict.pwi r,
+
}
--
Steve Beattie
http://NxNW.org/~steve/
signature.asc
Description: Digital signature
Package: hardening-wrapper
Version: 2.6
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu vivid ubuntu-patch
Dear Maintainer,
hardened-cc was adding the -Wformat-security option even if -Wno-format
was being specified on the compilation command line, which c
Package: squid3
Version: 3.1.19-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
Dear Maintainer,
In http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542723 all of the
hardening options were enabled for squid v2, due to it's handling
Package: devscripts
Version: 2.11.5
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
Dear Maintainer,
-- Package-specific info:
--- /etc/devscripts.conf ---
--- ~/.devscripts ---
DEBSIGN_KEYID=005E81F4
*** /home/steve/tmp/tmpH4sM5n/
hardening[1] enabled for its build. The attached
patch implements this.
Thanks!
-- Steve Beattie
[1] http://wiki.debian.org/Hardening
*** /home/steve/tmp/tmpsYv2qc
In Ubuntu, the attached patch was applied to achieve the following:
* Re-enable hardened build for PIE (LP: #768713)
Thanks for
Package: logwatch
Version: 7.3.6.cvs20090906-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu natty ubuntu-patch
*** /home/steve/tmp/tmpOr5E13
In Ubuntu, we've applied the attached patch to achieve the following:
* SECURITY UPDATE: privileged code exe
Package: krb5
Version: 1.8.3+dfsg-4
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu natty ubuntu-patch
Attached patches are taken from
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2011-001.txt and
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2011-
Package: tiff
Version: 3.9.4-2
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu maverick ubuntu-patch
In Ubuntu, we've applied the attached patch in lucid-security to
achieve the following:
* debian/patches/fix-ycbcr-oob-read.patch fix crash on
OOB r
18 matches
Mail list logo