diff options
-rw-r--r-- | Makefile | 2 | ||||
-rw-r--r-- | RELNOTES | 2 | ||||
-rw-r--r-- | platform/debian/control.amd64 | 2 | ||||
-rw-r--r-- | platform/debian/control.i386 | 2 | ||||
-rw-r--r-- | src/firecfg/desktop_files.c | 2 |
5 files changed, 5 insertions, 5 deletions
@@ -380,7 +380,7 @@ scan-build: clean | |||
380 | .PHONY: codespell | 380 | .PHONY: codespell |
381 | codespell: | 381 | codespell: |
382 | @printf 'Running %s...\n' $@ | 382 | @printf 'Running %s...\n' $@ |
383 | @codespell --ignore-regex 'UE|als|chage|creat|doas|ether|isplay|readby|[Ss]hotcut' \ | 383 | @codespell --ignore-regex 'Manuel|UE|als|chage|creat|doas|ether|isplay|readby|[Ss]hotcut' \ |
384 | -S *.d,*.gz,*.o,*.so \ | 384 | -S *.d,*.gz,*.o,*.so \ |
385 | -S COPYING,m4 \ | 385 | -S COPYING,m4 \ |
386 | -S ./contrib/syscalls.sh \ | 386 | -S ./contrib/syscalls.sh \ |
@@ -266,7 +266,7 @@ firejail (0.9.68) baseline; urgency=low | |||
266 | -- netblue30 <netblue30@yahoo.com> Sun, 6 Feb 2022 09:00:00 -0500 | 266 | -- netblue30 <netblue30@yahoo.com> Sun, 6 Feb 2022 09:00:00 -0500 |
267 | 267 | ||
268 | firejail (0.9.66) baseline; urgency=low | 268 | firejail (0.9.66) baseline; urgency=low |
269 | * deprecated --audit options, relpaced by jailcheck utility | 269 | * deprecated --audit options, replaced by jailcheck utility |
270 | * deprecated follow-symlink-as-user from firejail.config | 270 | * deprecated follow-symlink-as-user from firejail.config |
271 | * new firejail.config settings: private-bin, private-etc | 271 | * new firejail.config settings: private-bin, private-etc |
272 | * new firejail.config settings: private-opt, private-srv | 272 | * new firejail.config settings: private-opt, private-srv |
diff --git a/platform/debian/control.amd64 b/platform/debian/control.amd64 index f666200d5..59776d325 100644 --- a/platform/debian/control.amd64 +++ b/platform/debian/control.amd64 | |||
@@ -8,7 +8,7 @@ Suggests: python, python3 | |||
8 | Section: admin | 8 | Section: admin |
9 | Priority: optional | 9 | Priority: optional |
10 | Homepage: https://github.com/netblue30/firejail | 10 | Homepage: https://github.com/netblue30/firejail |
11 | Description: Linux namepaces sandbox program. | 11 | Description: Linux namespaces sandbox program. |
12 | Firejail is a SUID sandbox program that reduces the risk of security | 12 | Firejail is a SUID sandbox program that reduces the risk of security |
13 | breaches by restricting the running environment of untrusted applications | 13 | breaches by restricting the running environment of untrusted applications |
14 | using Linux namespaces and seccmp-bpf. It includes sandbox profiles for | 14 | using Linux namespaces and seccmp-bpf. It includes sandbox profiles for |
diff --git a/platform/debian/control.i386 b/platform/debian/control.i386 index ab9e0fc52..3d3f217c9 100644 --- a/platform/debian/control.i386 +++ b/platform/debian/control.i386 | |||
@@ -8,7 +8,7 @@ Suggests: python, python3 | |||
8 | Section: admin | 8 | Section: admin |
9 | Priority: optional | 9 | Priority: optional |
10 | Homepage: https://github.com/netblue30/firejail | 10 | Homepage: https://github.com/netblue30/firejail |
11 | Description: Linux namepaces sandbox program. | 11 | Description: Linux namespaces sandbox program. |
12 | Firejail is a SUID sandbox program that reduces the risk of security | 12 | Firejail is a SUID sandbox program that reduces the risk of security |
13 | breaches by restricting the running environment of untrusted applications | 13 | breaches by restricting the running environment of untrusted applications |
14 | using Linux namespaces and seccmp-bpf. It includes sandbox profiles for | 14 | using Linux namespaces and seccmp-bpf. It includes sandbox profiles for |
diff --git a/src/firecfg/desktop_files.c b/src/firecfg/desktop_files.c index ecb18a60e..1895e437b 100644 --- a/src/firecfg/desktop_files.c +++ b/src/firecfg/desktop_files.c | |||
@@ -57,7 +57,7 @@ static int check_profile(const char *name, const char *homedir) { | |||
57 | } | 57 | } |
58 | 58 | ||
59 | 59 | ||
60 | // look for a profile file in /etc/firejail diectory and in homedir/.config/firejail directory | 60 | // look for a profile file in /etc/firejail and ~/.config/firejail |
61 | static int have_profile(const char *filename, const char *homedir) { | 61 | static int have_profile(const char *filename, const char *homedir) { |
62 | assert(filename); | 62 | assert(filename); |
63 | assert(homedir); | 63 | assert(homedir); |