t/ubuntu/+source/tightvnc/+bug/1808989
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: PGP signature
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
#x27;re upgrading
> hardware you should probably be installing 16.04 on it.
>
April 2019, not 2018 (LTS is 5 years, not 4).
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
--
Ubuntu-devel-discuss mailing
Kind regards,
> Bryan
>
>
> On Wed, Jan 11, 2017 at 5:32 PM, Jamie Strandboge wrote:
> >
> > On Wed, 2017-01-11 at 08:29 +0100, Martin Pitt wrote:
> > >
> > > Jamie Strandboge [2017-01-10 16:27 -0600]:
> > > >
> > > >
> >
On Wed, 2017-01-11 at 08:29 +0100, Martin Pitt wrote:
> Jamie Strandboge [2017-01-10 16:27 -0600]:
> >
> > Remote logging. Rsyslog is far superior in this regard. Granted, remote
> > logging
> > is not enabled by default but it is a requirement in many environments.
&
it is in a binary format and you have to use
> journalctl to read it.
>
> I'm sure I missed some positives/negatives.
Remote logging. Rsyslog is far superior in this regard. Granted, remote logging
is not enabled by default but it is a requirement in many environments.
--
der, if AppArmor or any of the other software I didn't chose to
> install myself could be the culprit.
>
It isn't going to be apparmor-- there isn't a long running daemons. The security
policy is loaded into the kernel on boot/package upgrade/etc then after that the
kernel
>
That said, the new Ubuntu Snappy[1] strives to make things easier for upstreams
to reliably deliver software on their own schedule.
[1]http://www.ubuntu.com/cloud/tools/snappy
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signatur
t;
This issue is being tracked here:
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-9390.html
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description: OpenPGP digital signature
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubunt
is the
Canonical-supported MAC on Ubuntu, but SELinux is community supported in Ubuntu.
The kernel has support and we have syncs for the tools from Debian. The policy
needs work, but everything is there for people to use SELinux if they want to.
--
Jamie Strandboge http://www.ubuntu.com/
am aware of OTOH. The package in Ubuntu is based off the package in
Debian, which is 2.91.3+git20120514.b9fec3e1-1. I think Debian may be in the
process of updating the package, so an update may be coming soon.
--
Jamie Strandboge http://www.ubuntu.com/
signature.asc
Description:
On 07/05/2013 04:34 PM, Jamie Strandboge wrote:
> On 07/02/2013 05:06 PM, Jamie Strandboge wrote:
>
>> ...
>>
>> In essence, packaging is updated to include a JSON manifest file and then
>> updated to produce/install the apparmor policy and then load it into the
&
On 07/02/2013 05:06 PM, Jamie Strandboge wrote:
> ...
>
> In essence, packaging is updated to include a JSON manifest file and then
> updated to produce/install the apparmor policy and then load it into the
> kernel.
> The JSON security manifest will be a part of the la
ement/Manifest#Click
[4]https://wiki.ubuntu.com/SecurityTeam/Specifications/ApplicationConfinement/Manifest#Traditional_packaging
[5]http://tinyurl.com/mf28tw4
[6]https://blueprints.launchpad.net/ubuntu/+spec/security-s-appisolation-sdk
--
Jamie Strandboge http://www.ubuntu.c
this happens, then I presume that Chromium's main inclusion status
> will change.
>
Updates will be provided but have been delayed due to armhf build
failures. We recognize the delays are a problem and are (still) working
on ways to improve this going forward.
--
Jamie Strandboge
>
> That's not particularly news. Gufw is available in all supported releases
> except Hardy (and it can be gotten from hardy-backports there).
Actually it is new, cause it isn't gui-ufw. ;) It is a new project
called 'ufw-frontends', and I just found out about it myself.
-line-interface as well. Eg:
$ sudo ufw allow OpenSSH
$ sudo ufw enable
See 'man ufw' for details.
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@
te locally? Pointing me to an appropriate man page or wiki entry
is enough.
Thanks!
--
Jamie Strandboge | http://www.canonical.com
signature.asc
Description: This is a digitally signed message part
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
On Mon, 10 Mar 2008, George Orwell wrote:
> All releases of 0.9.8 prior to 0.9.8f"
>
> Gutsy's current version is 0.9.8e, unless I'm incorrect isn't
> this version vulnerable to this?
>
This was updated in October:
http://www.ubuntu.com/usn/usn-534-1
ufw is a new firewall application that has recently been uploaded to
universe. The goal is to have an easy to use firewall application for
end users, while at the same time not get in the sysadmin's way. It is
now in a state for wider testing.
Important notes:
* currently only host-based
* cli
has been updated with a new USN, and the new USN has been sent to
[EMAIL PROTECTED]
Details can be found here:
https://www-admin.ubuntu.com/usn/usn-544-2
Jamie Strandboge
- --
Email: [EMAIL PROTECTED]
IRC: jdstrand
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using G
20 matches
Mail list logo