|
Any | Feature Request | Very High | High | [motion] contains systemd unit file | Closed | |
Task Description
Description:
The Arch version of Motion from the snapshot used by Hyperbola comes with systemd support. Since Hyperbola follows the Init Freedom Campaign , systemd unit files removal is required or add OpenRC init scripts to replace it.
Additional info: * package version(s) * config and/or log files etc.
Repository : community
Name : motion
Version : 4.0.1-2
Description : A software motion detector which grabs images from video4linux devices and/or from webcams
Architecture : x86_64
URL : http://www.lavrsen.dk/foswiki/bin/view/Motion/WebHome
Licenses : GPL
Groups : None
Provides : None
Depends On : libjpeg v4l-utils ffmpeg
Optional Deps : None
Conflicts With : None
Replaces : None
Download Size : 235.61 KiB
Installed Size : 923.00 KiB
Packager : Sergej Pupykin <pupykin.s+arch@gmail.com>
Build Date : Mon 14 Nov 2016 02:17:55 PM -03
Validated By : MD5 Sum SHA-256 Sum Signature
/usr/lib/systemd/system/motion.service is owned by motion 4.0.1-2
Steps to reproduce:
|
|
Any | Feature Request | Very High | High | [pkgfile] contains systemd unit files | Closed | |
Task Description
Description:
The Arch version of pkgfile from the snapshot used by Hyperbola comes with systemd support. Since Hyperbola follows the Init Freedom Campaign , systemd unit files removal is required or add OpenRC init scripts to replace it.
Additional info: * package version(s) * config and/or log files etc.
Repository : extra
Name : pkgfile
Version : 17-1
Description : a pacman .files metadata explorer
Architecture : x86_64
URL : http://github.com/falconindy/pkgfile
Licenses : MIT
Groups : None
Provides : None
Depends On : libarchive curl pcre pacman
Optional Deps : None
Conflicts With : None
Replaces : None
Download Size : 23.16 KiB
Installed Size : 47.00 KiB
Packager : Dave Reisner <dreisner@archlinux.org>
Build Date : Tue 18 Apr 2017 05:30:59 PM -03
Validated By : MD5 Sum SHA-256 Sum Signature
/usr/lib/systemd/system/pkgfile-update.service is owned by pkgfile 17-1
/usr/lib/systemd/system/pkgfile-update.timer is owned by pkgfile 17-1
Steps to reproduce:
|
|
Any | Feature Request | Very High | High | [tinc] contains systemd unit files | Closed | |
Task Description
Description:
The Arch version of tinc from the snapshot used by Hyperbola comes with systemd support. Since Hyperbola follows the Init Freedom Campaign , systemd unit files removal is required or add OpenRC init scripts to replace it.
Additional info: * package version(s) * config and/or log files etc.
Repository : community
Name : tinc
Version : 1.0.31-2
Description : VPN (Virtual Private Network) daemon
Architecture : x86_64
URL : http://www.tinc-vpn.org/
Licenses : GPL
Groups : None
Provides : None
Depends On : lzo openssl zlib
Optional Deps : None
Conflicts With : None
Replaces : None
Download Size : 107.42 KiB
Installed Size : 194.00 KiB
Packager : Evangelos Foutras <evangelos@foutrelis.com>
Build Date : Mon 13 Mar 2017 01:06:11 AM -03
Validated By : MD5 Sum SHA-256 Sum Signature
/usr/lib/systemd/system/tinc.service is owned by tinc 1.0.31-2
/usr/lib/systemd/system/tinc@.service is owned by tinc 1.0.31-2
Steps to reproduce:
|
|
Any | Feature Request | Very High | High | [phpldapadmin] needs OpenRC init script | Closed | |
Task Description
pacman -Qi phpldapadmin Name : phpldapadmin Version : 1.2.3-8 Description : A PHP and hence web-based tool to administrate LDAP over
the WWW
Architecture : any URL : http://phpldapadmin.sourceforge.net/ Licenses : GPL Groups : None Provides : None Depends On : libldap php php-ldap Optional Deps : None Required By : None Optional For : None Conflicts With : None Replaces : None Installed Size : 3.03 MiB Packager : Sergej Pupykin <pupykin.s+arch@gmail.com> Build Date : Thu 02 Feb 2017 06:04:00 PM CET Install Date : Tue 10 Jul 2018 10:52:31 AM CEST Install Reason : Explicitly installed Install Script : No Validated By : Signature
|
|
Any | Bug Report | Very High | Critical | [python-acme] to start crashing on June 19th | Closed | |
Task Description
Description: Quoted from https://bugs.launchpad.net/ubuntu/+source/python-acme/+bug/1777205 Bug #1777205 reported by Brad Warren on 2018-06-16
[Impact]
Without this fix, on June 19, the library will start to fail when using Let’s Encrypt’s new ACMEv2 endpoint. We should avoid breaking this for users.
[Test Case]
On June 19, try to use Let’s Encrypt’s new ACMEv2 endpoint; it will error out, as described in https://community.letsencrypt.org/t/acmev2-order-ready-status/62866
[Regression Potential]
If the endpoint changes again, this will need another update, but the only potential regression I see is server-side, which needs patches on our end to adjust (like in this case).
[Original Bug Description]
I am the upstream maintainer of python-acme. This bug only affects python-acme in Ubuntu 18.04.
Starting on June 19th, this library will start failing when used with Let’s Encrypt’s new ACMEv2 endpoint. This is because the library does not recognize the changes described in https://community.letsencrypt.org/t/acmev2-order-ready-status/62866 and will error out when it sees them.
To fix this, python-acme either needs to be upgraded to 0.25.1 (which came out two days ago) or the one line patch that originally landed upstream at https://github.com/certbot/certbot/commit/5940ee92ab5c9a9f05f7067974f6e15c9fa3205a applied. I think the latter is the safer option.
Please let me know what I can do to help get this resolved.
Additional info: Solution is to upgrade the following packages
* certbot 0.23.0-1.hyperbola1.backports1 * python-acme 0.23.0-1.backports1
and any other that depends on certbot=0.23.0 and/or python-acme=0.23.0 (like the certbot plugins)
The other option is to patch certbot, as described in the launchpad’s issue
Steps to reproduce:
1) Install certbot 2) try anything related to the certificates (certonly, renew) 3) You may get an error like this:
Obtaining a new certificate
An unexpected error occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/josepy/json_util.py", line 280, in fields_from_json
fields[slot] = field.decode(value)
File "/usr/lib/python3.6/site-packages/josepy/json_util.py", line 88, in decode
return self.fdec(value)
File "/usr/lib/python3.6/site-packages/acme/messages.py", line 123, in from_json
'{0} not recognized'.format(cls.__name__))
josepy.errors.DeserializationError: Deserialization error: Status not recognized
During handling of the above exception, another exception occurred:
josepy.errors.DeserializationError: Deserialization error: Could not decode 'status' ('ready'): Deserialization error: Status not recognized
Please see the logfiles in /var/log/letsencrypt for more details.
|
|
Any | Security Issue | Very High | Critical | [znc] CVE-2018-14055: privilege escalation & CVE-2018-1 ... | Closed | |
Task Description
Severity: high
Versions affected: 1.6.0 through 1.7.0 Potentially, all earlier versions too, but there is no known way to trigger this before 1.6.0
Mitigation: upgrade to 1.7.1
Description: ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate privilege, inject rogue values into znc.conf, and gain shell access.
Upstream patches: https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d
—
Severity: medium
Versions affected: 0.045 through 1.7.0
Mitigation: upgrade to 1.7.1, or disable HTTP via `/msg *status AddPort`, `/msg *status DelPort` commands.
Description: ZNC before 1.7.1-rc1 is prone to a path traversal flaw. A non-admin user can set web skin name to ../ to access files outside of the intended skins directories and to cause DoS.
Upstream patch: https://github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773
|
|
Any | Security Issue | Very High | Critical | [wesnoth] CVE-2018-1999023 - Code Injection vulnerabili ... | Closed | |
Task Description
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
https://security-tracker.debian.org/tracker/CVE-2018-1999023
Upstream patch: https://github.com/wesnoth/wesnoth/commit/d911268a783467842d38eae7ac1630f1fea41318
|
|
Stable | Security Issue | Very High | Critical | [iceweasel-uxp] Issue with HTTPS websites | Closed | |
Task Description
With latest iceweasel-uxp, I can’t connect to some HTTPS websites :
For example :
https://pkgs.fedoraproject.org/ is an example
SEC_ERROR_UNKNOWN_ISSUER
|
|
Any | Feature Request | Very High | High | [pkgfile] contains systemd unit files | Closed | |
Task Description
Description:
The Arch version of pkgfile from the snapshot used by Hyperbola comes with systemd support. Since Hyperbola follows the Init Freedom Campaign , systemd unit files removal is required or create a cron job (scheduled task) to replace it.
Additional info: * package version(s) * config and/or log files etc.
Repository : extra
Name : pkgfile
Version : 17-1
Description : a pacman .files metadata explorer
Architecture : x86_64
URL : http://github.com/falconindy/pkgfile
Licenses : MIT
Groups : None
Provides : None
Depends On : libarchive curl pcre pacman
Optional Deps : None
Conflicts With : None
Replaces : None
Download Size : 23.16 KiB
Installed Size : 47.00 KiB
Packager : Dave Reisner <dreisner@archlinux.org>
Build Date : Tue 18 Apr 2017 05:30:59 PM -03
Validated By : MD5 Sum SHA-256 Sum Signature
/usr/lib/systemd/system/pkgfile-update.service is owned by pkgfile 17-1
/usr/lib/systemd/system/pkgfile-update.timer is owned by pkgfile 17-1
Steps to reproduce:
|
|
Any | Bug Report | Very High | Critical | [openrc] fix "chroot" initscript | Closed | |
Task Description
Description:
Additional info:
/etc/conf.d/chroot
# initial command
CR_COMD=/sbin/openrc-init
-# network interfaces
-CR_NINF="veth_guest ethernet"
-# wifi interfaces
-CR_WINF="wifi"
-# service dependecies
-CR_DEPS="net_veth.interface_host
- chroot.name net.interface_ethernet net.interface_wifi"
+# network interfaces, example: CR_NINF="veh0 eth0"
+CR_NINF=""
+# wifi interfaces, example: CR_WINF="wlan0"
+CR_WINF=""
+# service dependecies, example: CR_DEPS="net.veh0 chroot.dns chroot.ntp net.eth0 net.wlan0"
+CR_DEPS=""
# wait in seconds to run CR_COMD
CR_CDWT=1
-# wait in seconds to start the sercice
+# wait in seconds to start the service
CR_STWT=7
# wait in seconds to stop the service
CR_SPWT=7
/etc/init.d/chroot
depend() {
- need $CR_NDEP
+ need $CR_DEPS
after modules bootmisc localmount net netmount
keyword -jail -prefix -vserver
provide oslv
}
$ pacman -Si openrc
Repository : core
Name : openrc
Version : 0.28-18
Description : A dependency based init system that works with the system provided init program
Architecture : x86_64
URL : https://wiki.gentoo.org/wiki/Project:OpenRC
Licenses : BSD2
Groups : None
Provides : None
Depends On : psmisc pam
Optional Deps : netifrc: network interface management scripts
networkmanager: network connection manager and user applications
Conflicts With : None
Replaces : None
Download Size : 193.18 KiB
Installed Size : 1720.00 KiB
Packager : André Silva <emulatorman@hyperbola.info>
Build Date : Sun 08 Jul 2018 01:28:16 AM -03
Validated By : MD5 Sum SHA-256 Sum Signature
Steps to reproduce:
|
|
Any | Bug Report | Very High | Critical | [netifrc] fix "net_veth" and "net_macsec" initscripts | Closed | |
Task Description
Description:
Additional info:
/etc/conf.d/net_veth
-# Source Interface (host)
-IFSRC=interface_host
+# Source Interface (host), example: IFSRC=veh0
+IFSRC=veh0
# Set custom parameters on Source Interface
IFCTS=
-# Destination Interface (guest)
-IFDST=interface_guest
+# Destination Interface (guest), example: IFDST=veg0
+IFDST=veg0
# Set custom parameters on Destination Interface
IFCTD=
/etc/conf.d/net_macsec
-# Source Interface (host)
-IFSRC=interface_host
-# Network init service dependency from Source Interface
-#IFDEP=net.interface_host
-# Destination Interface (macsec/guest)
-IFDST=interface_macsec
+# Source Interface (host), example: IFSRC=eth0
+IFSRC=eth0
+# Network init service dependency from Source Interface, example: IFDEP=net.eth0
+IFDEP=
+# Destination Interface (macsec/guest), example: IFDST=macsec0
+IFDST=macsec0
# Set custom parameters on MACsec Interface
IFCTD=
---
IFPAR="cipher gcm-aes-128
icvlen 16
encrypt on
protect off
replay off
send_sci on
- validate strict"
+ validate disabled"
---
-# Add receive channels and/or receive association keys (RXSC), examples:
-#
-# [sci_<0..ffffffffffffffff(hex)>|port_<1..65535(dec)>_address_<00:00:00:00:00:00..ff:ff:ff:ff:ff:ff(hex)>][_<on/off>]
-#
-# sci_0
-# sci_ffffffffffffffff_on
-# port_1_address_00:00:00:00:00:00
-# port_2_address_ff:ff:ff:ff:ff:ff_off
-#
-# [sci_<0..ffffffffffffffff(hex)>_|port_<1..65535(dec)>_address_<00:00:00:00:00:00..ff:ff:ff:ff:ff:ff(hex)>_]sa_<0..3(dec)>_[pn_<1..4294967295(dec)>_][<on/off>_]key_<00..ff(hex)>_<00000000000000000000000000000000..ffffffffffffffffffffffffffffffff(hex)>
-#
-# sa_0_key_00_00000000000000000000000000000000
-# sa_1_key_pn_1_01_f00f00f00f00f00f00f00f00f00f00f0
-# sa_2_key_on_32_de_de00de00de00de00de00de00de00de00
-# sa_3_key_pn_16345_off_a1_fca1fca1fca1fca1fca1fca1fca1fca1
-# sci_0_sa_0_key_00_00000000000000000000000000000000
-# sci_32_sa_1_key_pn_1_01_f00f00f00f00f00f00f00f00f00f00f0
-# sci_451_sa_2_key_on_32_de_de00de00de00de00de00de00de00de00
-# sci_7438f_sa_3_key_pn_16345_off_a1_fca1fca1fca1fca1fca1fca1fca1fca1
-# port_1_address_00:00:00:00:00:00_sa_0_key_00_00000000000000000000000000000000
-# port_2_address_ff:ff:ff:ff:ff:ff_sa_1_key_pn_1_01_f00f00f00f00f00f00f00f00f00f00f0
-# port_3_address_00:00:00:ff:ff:ff_sa_2_key_on_32_de_de00de00de00de00de00de00de00de00
-# port_4_address_ff:ff:ff:00:00:00_sa_3_key_pn_16345_off_a1_fca1fca1fca1fca1fca1fca1fca1fca1
+# Add receive channels and/or receive association keys (RXSC), examples:
+#
+# "[sci <0..ffffffffffffffff(hex)>|port <1..65535(dec)> address <00:00:00:00:00:00..ff:ff:ff:ff:ff:ff(hex)>][ <on/off>]"
+#
+# "sci 0"
+# "sci ffffffffffffffff on"
+# "port 1 address 00:00:00:00:00:00"
+# "port 2 address ff:ff:ff:ff:ff:ff off"
+#
+# "[sci <0..ffffffffffffffff(hex)> |port <1..65535(dec)> address <00:00:00:00:00:00..ff:ff:ff:ff:ff:ff(hex)> ]sa <0..3(dec)> [pn <1..4294967295(dec)> ][<on/off> ]key <00..ff(hex)> <00000000000000000000000000000000..ffffffffffffffffffffffffffffffff(hex)>"
+#
+# "sci 0 sa 0 key 00 00000000000000000000000000000000"
+# "sci 32 sa 1 pn 1 key 01 f00f00f00f00f00f00f00f00f00f00f0"
+# "sci 451 sa 2 on key de de00de00de00de00de00de00de00de00"
+# "sci 7438f sa 3 pn 16345 off key a1 fca1fca1fca1fca1fca1fca1fca1fca1"
+# "port 1 address 00:00:00:00:00:00 sa 0 key 00 00000000000000000000000000000000"
+# "port 2 address ff:ff:ff:ff:ff:ff sa 1 pn 1 key 01 f00f00f00f00f00f00f00f00f00f00f0"
+# "port 3 address 00:00:00:ff:ff:ff sa 2 on key de de00de00de00de00de00de00de00de00"
+# "port 4 address ff:ff:ff:00:00:00 sa 3 pn 16345 off key a1 fca1fca1fca1fca1fca1fca1fca1fca1"
+#
+# IFRSC=("port 1 address 00:00:00:00:00:00 on"
+# "port 1 address 00:00:00:00:00:00 sa 0 pn 1 on key 00 00000000000000000000000000000000"
+# "sci ffffffffffff0001 on"
+# "sci ffffffffffff0001 sa 0 pn 1 on key 00 ffffffffffffffffffffffffffffffff")
IFRSC=()
-# Add trasmition association keys (TXSC) , examples:
-# sa_<0..3(dec)>_[pn_<1..4294967295(dec)>_][<on/off>_]key_<00..ff(hex)>_<00000000000000000000000000000000..ffffffffffffffffffffffffffffffff(hex)>
-#
-# sa_0_key_00_00000000000000000000000000000000
-# sa_1_key_pn_1_01_f00f00f00f00f00f00f00f00f00f00f0
-# sa_2_key_on_32_de_de00de00de00de00de00de00de00de00
-# sa_3_key_pn_16345_off_a1_fca1fca1fca1fca1fca1fca1fca1fca1
+# Add trasmition association keys (TXSC) , examples:
+# "sa <0..3(dec)> [pn <1..4294967295(dec)> ][<on/off> ]key <00..ff(hex)> <00000000000000000000000000000000..ffffffffffffffffffffffffffffffff(hex)>"
+#
+# "sa 0 key 00 00000000000000000000000000000000"
+# "sa 1 pn 1 key 01 f00f00f00f00f00f00f00f00f00f00f0"
+# "sa 2 on key de de00de00de00de00de00de00de00de00"
+# "sa 3 pn 16345 off key a1 fca1fca1fca1fca1fca1fca1fca1fca1"
+#
+# IFTSC=("sa 0 pn 1 on key 00 00000000000000000000000000000000")
IFTSC=()
/etc/init.d/net_macsec
if [[ $IFRSC ]]; then
- for mac_rxsc in ${IFRSC[@]}; do
- ip macsec add $IFDST rx ${mac_rxsc/_/ }
+ for mac_rxsc in "${IFRSC[@]}"; do
+ ip macsec add $IFDST rx $mac_rxsc
done
fi
if [[ $IFTSC ]]; then
- for mac_txsc in ${IFTSC[@]}; do
- ip macsec add $IFDST tx ${mac_txsc/_/ }
+ for mac_txsc in "${IFTSC[@]}"; do
+ ip macsec add $IFDST tx $mac_txsc
done
fi
$ pacman -Si netifrc
Repository : core
Name : netifrc
Version : 0.6.0-2.backports1
Description : Network interface management scripts
Architecture : x86_64
URL : https://wiki.gentoo.org/wiki/Netifrc
Licenses : BSD2
Groups : base
Provides : None
Depends On : eudev
Optional Deps : iproute2: for interface handler, VPN, bridging and tunneling support (recommended)
net-tools: for interface handler support
bridge-utils: for bridging support
linux-atm: for CLIP and RFC 2684 bridge support
wpa_supplicant: for wireless networking support (recommended)
wireless_tools: for wireless networking support
dhcpcd: for DHCP support (recommended)
dhclient: for DHCP support
busybox: for DHCP support
iputils: for APIPA support
ifenslave: for bonding interfaces
ppp: for PPP and ADSL support (recommended)
rp-pppoe: for ADSL support
macchanger: for changing MAC addresses
ifplugd: for cable in/out detection
Conflicts With : None
Replaces : None
Download Size : 66.18 KiB
Installed Size : 373.00 KiB
Packager : André Silva <emulatorman@hyperbola.info>
Build Date : Tue 03 Jul 2018 12:16:13 AM -03
Validated By : MD5 Sum SHA-256 Sum Signature
Steps to reproduce:
|
|
Any | Bug Report | Very High | Critical | [netifrc] "net.lo" initscript is forced to load in "boo ... | Closed | |
Task Description
Description:
“net.lo” initscript is forced to load in “boot” runlevel by default.
“loopback” interface doesn’t need changes.
“net.lo” initscript conflicts with another network services, like: NetworkManager.
“net.lo” initscript takes extra processor and memory resources when is useless.
Additional info:
This file needs be removed:
* /etc/runlevels/boot/net.lo
$ pacman -Si netifrc
Repository : core
Name : netifrc
Version : 0.6.0-2.backports1
Description : Network interface management scripts
Architecture : x86_64
URL : https://wiki.gentoo.org/wiki/Netifrc
Licenses : BSD2
Groups : base
Provides : None
Depends On : eudev
Optional Deps : iproute2: for interface handler, VPN, bridging and tunneling support (recommended)
net-tools: for interface handler support
bridge-utils: for bridging support
linux-atm: for CLIP and RFC 2684 bridge support
wpa_supplicant: for wireless networking support (recommended)
wireless_tools: for wireless networking support
dhcpcd: for DHCP support (recommended)
dhclient: for DHCP support
busybox: for DHCP support
iputils: for APIPA support
ifenslave: for bonding interfaces
ppp: for PPP and ADSL support (recommended)
rp-pppoe: for ADSL support
macchanger: for changing MAC addresses
ifplugd: for cable in/out detection
Conflicts With : None
Replaces : None
Download Size : 66.18 KiB
Installed Size : 373.00 KiB
Packager : André Silva <emulatorman@hyperbola.info>
Build Date : Tue 03 Jul 2018 12:16:13 AM -03
Validated By : MD5 Sum SHA-256 Sum Signature
Steps to reproduce:
|
|
Any | Bug Report | Very High | Critical | [eudev] "udev" and "udev-trigger" initscripts are force ... | Closed | |
Task Description
Description:
“udev” initscript is loaded by “udev-trigger”.
“udev-trigger” is needed load on “boot” runlevel, not”sysinit” one.
“udev-trigger” initscript is forced to be added in the sysinit runlevel through upgrading package process
It avoids use “eudev” side-by-side with “vdev”.
Additional info:
This file need be removed:
* /etc/runlevels/sysinit/udev
This file needs to be changed in "boot" runlevel, not "sysinit" runlevel;
This file needs be included only in the installing process not updating one.
- /etc/runlevels/sysinit/udev-trigger
+ /etc/runlevels/boot/udev-trigger
$ pacman -Si eudev
Repository : core
Name : eudev
Version : 3.2.5-2
Description : The userspace dev tools (udev) forked by Gentoo, with OpenRC support
Architecture : x86_64
URL : https://wiki.gentoo.org/wiki/Project:Eudev
Licenses : GPL
Groups : None
Provides : udev
Depends On : libeudev kbd kmod hwids util-linux
Optional Deps : None
Conflicts With : udev
Replaces : udev
Download Size : 931.20 KiB
Installed Size : 7072.00 KiB
Packager : André Silva <emulatorman@hyperbola.info>
Build Date : Sun 01 Jul 2018 01:26:17 AM -03
Validated By : MD5 Sum SHA-256 Sum Signature
Steps to reproduce:
|
|
Any | Bug Report | Very High | Critical | [openrc] run "sysctl" initscript after "net" initscript | Closed | |
Task Description
Description:
Additional info:
/etc/init.d/sysctl
- after clock
+ after clock net
$ pacman -Si openrc
Repository : core
Name : openrc
Version : 0.28-18
Description : A dependency based init system that works with the system provided init program
Architecture : x86_64
URL : https://wiki.gentoo.org/wiki/Project:OpenRC
Licenses : BSD2
Groups : None
Provides : None
Depends On : psmisc pam
Optional Deps : netifrc: network interface management scripts
networkmanager: network connection manager and user applications
Conflicts With : None
Replaces : None
Download Size : 193.18 KiB
Installed Size : 1720.00 KiB
Packager : André Silva <emulatorman@hyperbola.info>
Build Date : Sun 08 Jul 2018 01:28:16 AM -03
Validated By : MD5 Sum SHA-256 Sum Signature
Steps to reproduce:
|
|
Any | Backport Request | Very High | High | [nodejs] backporting to nodejs LTS 8.11.3 | Closed | |
Task Description
Description:
Hi dear developers of Hyperbola. I work in the field of web development. I use a lot of javascript and nodejs to compile. Could they do the nodejs update?. I also mention this because Hyperbola works with LTS packages.
Additional info:
* package version(s)
$ sudo pacman -Si nodejs
Repositorio : community
Nombre : nodejs
Versión : 7.10.0-1
Descripción : Evented I/O for V8 javascript
Arquitectura : x86_64
URL : http://nodejs.org/
Licencias : MIT
Grupos : Nada
Provee : Nada
Depende de : openssl-1.0 zlib icu libuv http-parser c-ares
Dependencias opcionales : npm: nodejs package manager
En conflicto con : Nada
Remplaza a : Nada
Tamaño de la descarga : 4,55 MiB
Tamaño de la instalación : 18,49 MiB
Encargado : Felix Yan <felixonmars@archlinux.org>
Fecha de creación : mié 03 may 2017 09:50:26 -05
Validado por : Suma MD5 Suma SHA-256 Firma
$ sudo pacman -Si npm
Repositorio : community
Nombre : npm
Versión : 4.5.0-1
Descripción : A package manager for javascript
Arquitectura : any
URL : https://www.npmjs.com/
Licencias : custom:Artistic
Grupos : Nada
Provee : nodejs-node-gyp
Depende de : nodejs semver
Dependencias opcionales : python2: for node-gyp
En conflicto con : Nada
Remplaza a : Nada
Tamaño de la descarga : 2,72 MiB
Tamaño de la instalación : 13,98 MiB
Encargado : Felix Yan <felixonmars@archlinux.org>
Fecha de creación : mié 12 abr 2017 22:08:06 -05
Validado por : Suma MD5 Suma SHA-256 Firma
- NodeJS LTS (includes npm 5.6.0):
* https://nodejs.org/dist/v8.11.3/node-v8.11.3.tar.gz
* https://nodejs.org/dist/v8.11.3/SHASUMS256.txt.asc
Some errors that I suffer when compiling: - https://stackoverflow.com/questions/46476741/nodejs-util-promisify-is-not-a-function
|
|
Any | Security Issue | Very High | Critical | [openssh] CVE-2018-15473 | Closed | |
Task Description
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
https://security-tracker.debian.org/tracker/CVE-2018-15473
Patch: https://salsa.debian.org/ssh-team/openssh/commit/4641c58a3279f6b118f9562babaa0ee050a38619
Technical analysis: https://blog.nviso.be/2018/08/21/openssh-user-enumeration-vulnerability-a-close-look/
|
|
Any | Feature Request | Very High | High | [netdata] contains systemd unit files | Closed | |
Task Description
Description:
The Arch version of tinc from the snapshot used by Hyperbola comes with systemd support. Since Hyperbola follows the Init Freedom Campaign , systemd unit files removal is required or add OpenRC init scripts to replace it.
Additional info: * package version(s) * config and/or log files etc.
Repositorio : community
Nombre : netdata
Versión : 1.6.0-3
Descripción : Real-time performance monitoring, in the greatest possible detail, over the web.
Arquitectura : x86_64
URL : https://github.com/firehol/netdata/wiki
Licencias : GPL
Grupos : Nada
Provee : Nada
Depende de : libmnl libnetfilter_acct zlib
Dependencias opcionales : nodejs: Webbox plugin
lm_sensors: sensors module
En conflicto con : Nada
Remplaza a : Nada
Tamaño de la descarga : 1778,98 KiB
Tamaño de la instalación : 6515,00 KiB
Encargado : Sven-Hendrik Haase <sh@lutzhaase.com>
Fecha de creación : dom 23 abr 2017 16:24:38 -05
Validado por : Suma MD5 Suma SHA-256 Firma
community/netdata /usr/lib/systemd/
community/netdata /usr/lib/systemd/system/
community/netdata /usr/lib/systemd/system/netdata.service
Steps to reproduce:
|
|
Any | Feature Request | Very High | High | [backuppc]: contains systemd files | Closed | |
Task Description
Description:
Since Hyperbola follows the Init Freedom Campaign, systemd unit files removal is required or add OpenRC init scripts to replace it.
Additional info: * package version(s)
community/backuppc 4.1.2-1 [installed]
Enterprise-grade system for backing up Linux, Windows and MacOS PCs
* config and/or log files etc.
Additional info:
Steps to reproduce: install it
|
|
Any | Feature Request | Very High | High | [gpsd]: contains systemd files | Closed | |
Task Description
Since Hyperbola follows the Init Freedom Campaign, systemd unit files removal is required or add OpenRC init scripts to replace it.
Additional info: * package version(s)
extra/gpsd 3.16-3 [installed]
GPS daemon and library to support USB/serial GPS devices
* config and/or log files etc.
Additional info:
Steps to reproduce: install it
|
|
Any | Security Issue | Very High | Critical | [dropbear] CVE-2018-15599 | Closed | |
Task Description
User enumeration in Dropbear 2018.76 and earlier http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html
Patch: https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00
|
|
Any | Security Issue | Very High | Critical | [mutt] CVE-2018-14354 | Closed | |
Task Description
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
https://security-tracker.debian.org/tracker/CVE-2018-14354
|
|
Any | Security Issue | Very High | Critical | [iceweasel-uxp-noscript] Zero-day bypass and script exe ... | Closed | |
Task Description
Description:
NoScript zero-day allows script execution even with scripts blocked by default.
https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/
https://twitter.com/ma1/status/1039163003034324992
Additional info: * package version(s) < 5.1.8.7
Steps to reproduce: Set the Content-Type of your html/js page to “text/html;json” and enjoy full JS pwnage”
|
|
Stable | Feature Request | Very High | High | [hiawatha]: remove systemd files, provide openrc | Closed | |
Task Description
Description:
Hiawatha contains only systemd files.
It shall be removed and openrc shall be provided
|
|
Any | Security Issue | Very High | Critical | [util-linux] CVE-2018-7738 | Closed | |
Task Description
Description: In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
https://blog.grimm-co.com/post/malicious-command-execution-via-bash-completion-cve-2018-7738/
|
|
Any | Feature Request | Very High | High | [dovecot] needs OpenRC init script and contains systemd ... | Closed | |
Task Description
Description:
Additional info:
dovecot /usr/lib/systemd/system/dovecot.service
dovecot /usr/lib/systemd/system/dovecot.socket
dovecot /usr/lib/tmpfiles.d/dovecot.conf
Steps to reproduce:
|
|
Any | Feature Request | Very High | High | [onioncat] needs OpenRC init script | Closed | |
|
|
Any | Feature Request | Very High | High | [umurmur] needs OpenRC init script and contains systemd ... | Closed | |
|
|
Any | Feature Request | Very High | High | [prosody] needs OpenRC init script and contains systemd ... | Closed | |
|
|
Any | Feature Request | Very High | High | [unrealircd] needs OpenRC init script and contains syst ... | Closed | |
|
|
Any | Feature Request | Very High | High | [mcelog] needs OpenRC init script and contains systemd ... | Closed | |
|
|
Any | Bug Report | Very High | High | [openrc] needs a minor fix | Closed | |
|
|
Any | Feature Request | Very High | High | [bzr] needs OpenRC init script (bzr serve) | Closed | |
|
|
Any | Feature Request | Very High | High | [mercurial] needs OpenRC init scripts (hg serve and chg ... | Closed | |
|
|
Any | Implementation Request | Very High | High | [murmur-headless] add a Murmur package capable of worki ... | Closed | |
|
|
Any | Implementation Request | Very High | High | [asterisk-headless] add an Asterisk package capable of ... | Closed | |
|
|
Any | Implementation Request | Very High | Medium | [coturn] add new package | Closed | |
|
|
Any | Implementation Request | Very High | Medium | [mediagoblin] add GNU MediaGoblin package | Closed | |
|
|
Any | Security Issue | Very High | Critical | [schroedinger] unmaintained and unsupportable | Closed | |
|
|
Any | Security Issue | Very High | Critical | [vlc] CVE-2017-17670 | Closed | |
|
|
Any | Security Issue | Very High | Critical | [vlc] CVE-2018-11529 | Closed | |
|
|
Any | Security Issue | Very High | Critical | [qtpass] Insecure Password Generation prior to 1.2.1 | Closed | |
|
|
Any | Freedom Issue | Very High | Critical | [qtemu] package recommends installing non-free OSes | Closed | |
|
|
Any | Security Issue | Very High | Critical | [toxcore] Memory leak - Remote DDoS vunerability | Closed | |
|
|
Any | Security Issue | Very High | Critical | [libssh] CVE-2018-10933 | Closed | |
|
|
Any | Security Issue | Very High | Critical | [openldap] 2.4.44 multiple security issues | Closed | |
|
|
Any | Bug Report | Very High | High | [mkinitcpio] consolefont and keymap hooks is adapted to ... | Closed | |
|
|
Any | Security Issue | Very High | Critical | [php] CVE-2017-9120 | Closed | |
|
|
Stable | Freedom Issue | Very High | Critical | [cool-retro-term] update package to 1.0.1 and remove no ... | Closed | |
|
|
Stable | Freedom Issue | Very High | Critical | [xorg-fonts-misc] contains non-libre/free Syriac typefa ... | Closed | |
|
|
Any | Freedom Issue | Very High | Critical | [python-pip][python2-pip] Pip recommends proprietary so ... | Closed | |
|