NTP rule uses CUPS port
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Gufw |
Fix Released
|
Undecided
|
Unassigned | ||
gui-ufw (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
GUFW comes with a number of default service definitions. The one for NTP mistakenly uses the port from CUPS (631) instead of NTP (123). Obviously, this can lead to misconfigured firewalls, and thus to unsuspected security problems.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: gufw 14.04.2-0ubuntu1.1
ProcVersionSign
Uname: Linux 3.13.0-37-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.6
Architecture: amd64
Date: Sat Nov 1 19:29:13 2014
InstallationDate: Installed on 2013-08-11 (447 days ago)
InstallationMedia: Lubuntu 13.04 "Raring Ringtail" - Release amd64 (20130423.1)
PackageArchitec
ProcEnviron:
LANGUAGE=de_DE
TERM=xterm
PATH=(custom, no user)
LANG=de_DE.UTF-8
SHELL=/bin/bash
SourcePackage: gui-ufw
UpgradeStatus: Upgraded to trusty on 2014-11-01 (0 days ago)
mtime.conffile.
Related branches
Changed in gui-ufw: | |
status: | In Progress → Fix Released |
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res