aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--Makefile2
-rw-r--r--RELNOTES2
-rw-r--r--platform/debian/control.amd642
-rw-r--r--platform/debian/control.i3862
-rw-r--r--src/firecfg/desktop_files.c2
5 files changed, 5 insertions, 5 deletions
diff --git a/Makefile b/Makefile
index 5a08c85bb..4c87a1202 100644
--- a/Makefile
+++ b/Makefile
@@ -380,7 +380,7 @@ scan-build: clean
380.PHONY: codespell 380.PHONY: codespell
381codespell: 381codespell:
382 @printf 'Running %s...\n' $@ 382 @printf 'Running %s...\n' $@
383 @codespell --ignore-regex 'UE|als|chage|creat|doas|ether|isplay|readby|[Ss]hotcut' \ 383 @codespell --ignore-regex 'Manuel|UE|als|chage|creat|doas|ether|isplay|readby|[Ss]hotcut' \
384 -S *.d,*.gz,*.o,*.so \ 384 -S *.d,*.gz,*.o,*.so \
385 -S COPYING,m4 \ 385 -S COPYING,m4 \
386 -S ./contrib/syscalls.sh \ 386 -S ./contrib/syscalls.sh \
diff --git a/RELNOTES b/RELNOTES
index e1b0a6107..01b5be520 100644
--- a/RELNOTES
+++ b/RELNOTES
@@ -266,7 +266,7 @@ firejail (0.9.68) baseline; urgency=low
266 -- netblue30 <netblue30@yahoo.com> Sun, 6 Feb 2022 09:00:00 -0500 266 -- netblue30 <netblue30@yahoo.com> Sun, 6 Feb 2022 09:00:00 -0500
267 267
268firejail (0.9.66) baseline; urgency=low 268firejail (0.9.66) baseline; urgency=low
269 * deprecated --audit options, relpaced by jailcheck utility 269 * deprecated --audit options, replaced by jailcheck utility
270 * deprecated follow-symlink-as-user from firejail.config 270 * deprecated follow-symlink-as-user from firejail.config
271 * new firejail.config settings: private-bin, private-etc 271 * new firejail.config settings: private-bin, private-etc
272 * new firejail.config settings: private-opt, private-srv 272 * new firejail.config settings: private-opt, private-srv
diff --git a/platform/debian/control.amd64 b/platform/debian/control.amd64
index f666200d5..59776d325 100644
--- a/platform/debian/control.amd64
+++ b/platform/debian/control.amd64
@@ -8,7 +8,7 @@ Suggests: python, python3
8Section: admin 8Section: admin
9Priority: optional 9Priority: optional
10Homepage: https://github.com/netblue30/firejail 10Homepage: https://github.com/netblue30/firejail
11Description: Linux namepaces sandbox program. 11Description: Linux namespaces sandbox program.
12 Firejail is a SUID sandbox program that reduces the risk of security 12 Firejail is a SUID sandbox program that reduces the risk of security
13 breaches by restricting the running environment of untrusted applications 13 breaches by restricting the running environment of untrusted applications
14 using Linux namespaces and seccmp-bpf. It includes sandbox profiles for 14 using Linux namespaces and seccmp-bpf. It includes sandbox profiles for
diff --git a/platform/debian/control.i386 b/platform/debian/control.i386
index ab9e0fc52..3d3f217c9 100644
--- a/platform/debian/control.i386
+++ b/platform/debian/control.i386
@@ -8,7 +8,7 @@ Suggests: python, python3
8Section: admin 8Section: admin
9Priority: optional 9Priority: optional
10Homepage: https://github.com/netblue30/firejail 10Homepage: https://github.com/netblue30/firejail
11Description: Linux namepaces sandbox program. 11Description: Linux namespaces sandbox program.
12 Firejail is a SUID sandbox program that reduces the risk of security 12 Firejail is a SUID sandbox program that reduces the risk of security
13 breaches by restricting the running environment of untrusted applications 13 breaches by restricting the running environment of untrusted applications
14 using Linux namespaces and seccmp-bpf. It includes sandbox profiles for 14 using Linux namespaces and seccmp-bpf. It includes sandbox profiles for
diff --git a/src/firecfg/desktop_files.c b/src/firecfg/desktop_files.c
index ecb18a60e..1895e437b 100644
--- a/src/firecfg/desktop_files.c
+++ b/src/firecfg/desktop_files.c
@@ -57,7 +57,7 @@ static int check_profile(const char *name, const char *homedir) {
57} 57}
58 58
59 59
60// look for a profile file in /etc/firejail diectory and in homedir/.config/firejail directory 60// look for a profile file in /etc/firejail and ~/.config/firejail
61static int have_profile(const char *filename, const char *homedir) { 61static int have_profile(const char *filename, const char *homedir) {
62 assert(filename); 62 assert(filename);
63 assert(homedir); 63 assert(homedir);