Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#66547 - [g15daemon] Upstream URL hijacked for malware delivery; switch to sourceforge project URL?
Attached to Project:
Community Packages
Opened by Pol Van Aubel (MacGyver) - Tuesday, 05 May 2020, 14:41 GMT
Last edited by Jelle van der Waa (jelly) - Wednesday, 16 September 2020, 18:40 GMT
Opened by Pol Van Aubel (MacGyver) - Tuesday, 05 May 2020, 14:41 GMT
Last edited by Jelle van der Waa (jelly) - Wednesday, 16 September 2020, 18:40 GMT
|
DetailsDescription: The g15tools.com domain seems to have been hijacked to redirect for fake news and malware delivery purposes. A sensible alternative would be to switch to the g15daemon URL on sourceforge (yes, I see the irony here), at https://sourceforge.net/projects/g15daemon/ for g15daemon and https://sourceforge.net/projects/g15tools/ for the libraries.
Additional info: Affects * g15daemon 1.9.5.3-8 * libg15 1.2.7-3 * libg15render 1.2-4 Steps to reproduce: pacman -Qi g15daemon |
This task depends upon
Closed by Jelle van der Waa (jelly)
Wednesday, 16 September 2020, 18:40 GMT
Reason for closing: Fixed
Additional comments about closing: 1.9.5.3-10
Wednesday, 16 September 2020, 18:40 GMT
Reason for closing: Fixed
Additional comments about closing: 1.9.5.3-10