FS#66547 - [g15daemon] Upstream URL hijacked for malware delivery; switch to sourceforge project URL?

Attached to Project: Community Packages
Opened by Pol Van Aubel (MacGyver) - Tuesday, 05 May 2020, 14:41 GMT
Last edited by Jelle van der Waa (jelly) - Wednesday, 16 September 2020, 18:40 GMT
Task Type General Gripe
Category Packages
Status Closed
Assigned To Evgeniy Alexeev (arcan1s)
Architecture All
Severity Low
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description: The g15tools.com domain seems to have been hijacked to redirect for fake news and malware delivery purposes. A sensible alternative would be to switch to the g15daemon URL on sourceforge (yes, I see the irony here), at https://sourceforge.net/projects/g15daemon/ for g15daemon and https://sourceforge.net/projects/g15tools/ for the libraries.

Additional info:
Affects
* g15daemon 1.9.5.3-8
* libg15 1.2.7-3
* libg15render 1.2-4

Steps to reproduce:
pacman -Qi g15daemon
This task depends upon

Closed by  Jelle van der Waa (jelly)
Wednesday, 16 September 2020, 18:40 GMT
Reason for closing:  Fixed
Additional comments about closing:  1.9.5.3-10

Loading...