|
Any | Privacy Issue | Very Low | Critical | [bleachbit] needs to be adapted to UXP applications | Closed | |
Task Description
The current version of BleachBit needs to be adapted so it can clean the new .cache/hyperbola/ directory.
|
|
Any | Security Issue | Very Low | Critical | [unbound] Multiple CVEs | Closed | |
Task Description
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
[Critical] https://security-tracker.debian.org/tracker/CVE-2019-18934
|
|
Stable | Bug Report | Very Low | Critical | [smartmontools] update-smart-drivedb fails to update | Closed | |
Task Description
smartmontools 6.5-1.hyperbola1
Error while trying to update smart-drivedb :
anon@test[~] update-smart-drivedb
External Link/usr/bin/update-smart-drivedb: download from branches/RELEASE_6_5_DRIVEDB failed (curl: exit 23)
/usr/bin/update-smart-drivedb: download from trunk failed (curl: exit 23)
|
|
Stable | Security Issue | Very Low | Critical | [lts-kernel][sec] filter /dev/mem access & restrict acc ... | Closed | |
Task Description
These two options could be enabled :
Kernel hacking → [*] Filter access to /dev/mem [*] Filter I/O access to /dev/mem
Security options → [*] Restrict unprivileged access to the kernel syslog
|
|
Any | Security Issue | Very Low | Critical | [opensmtpd] CVE-2020-8794 | Closed | |
Task Description
Description: https://www.openwall.com/lists/oss-security/2020/02/24/5 https://www.bleepingcomputer.com/news/security/new-critical-rce-bug-in-openbsd-smtp-server-threatens-linux-distros/
Qualys Security Advisory
LPE and RCE in OpenSMTPD’s default install (CVE-2020-8794)
Summary Analysis ... Acknowledgments
We discovered a vulnerability in OpenSMTPD, OpenBSD’s mail server. This vulnerability, an out-of-bounds read introduced in December 2015 (commit 80c6a60c, “when peer outputs a multi-line response ...”), is exploitable remotely and leads to the execution of arbitrary shell commands: either as root, after May 2018 (commit a8e22235, “switch smtpd to new grammar”); or as any non-root user, before May 2018.
Because this vulnerability resides in OpenSMTPD’s client-side code (which delivers mail to remote SMTP servers), we must consider two different scenarios:
- Client-side exploitation: This vulnerability is remotely exploitable
in OpenSMTPD's (and hence OpenBSD's) default configuration. Although
OpenSMTPD listens on localhost only, by default, it does accept mail
from local users and delivers it to remote servers. If such a remote
server is controlled by an attacker (either because it is malicious or
compromised, or because of a man-in-the-middle, DNS, or BGP attack --
SMTP is not TLS-encrypted by default), then the attacker can execute
arbitrary shell commands on the vulnerable OpenSMTPD installation.
- Server-side exploitation: First, the attacker must connect to the
OpenSMTPD server (which accepts external mail) and send a mail that
creates a bounce. Next, when OpenSMTPD connects back to their mail
server to deliver this bounce, the attacker can exploit OpenSMTPD's
client-side vulnerability. Last, for their shell commands to be
executed, the attacker must (to the best of our knowledge) crash
OpenSMTPD and wait until it is restarted (either manually by an
administrator, or automatically by a system update or reboot).
We developed a simple exploit for this vulnerability and successfully tested it against OpenBSD 6.6 (the current release), OpenBSD 5.9 (the first vulnerable release), Debian 10 (stable), Debian 11 (testing), and Fedora 31.
The fix is delivered in OpenSMTPD 6.6.4p1, available here, which the developer recommends installing “AS SOON AS POSSIBLE.”
|
|
Stable | Bug Report | Very Low | Critical | [gtk-2] Severe problems with GTK2-applications | Closed | |
Task Description
Description: Since the migration to xenocara there seems to be a bug with applications using GTK-2. From time to time there are crashes with assertion `!xcb_xlib_threads_sequence_lost’.
Looking into this a little bit more deep there are also other distributions affected and this is an upstream-bug. But the concrete situation is not that easy, while it could be also part of the library libX11 itself. Looking therefore here: https://bugs.launchpad.net/ubuntu/+source/pcmanfm/+bug/1782984
Affected are for example LXDE in general, icedove, iceweasel and many more!
|
|
Stable | Freedom Issue | Very Low | Critical | [keybase] Complete removal of tool | Closed | |
Task Description
There is only the source code of the client available and since years nothing more happened. With keybase joining “Zoom” nothing more seems to happen. Look also here in the forum: https://forums.hyperbola.info/viewtopic.php?id=368
|
|
Any | Security Issue | Very High | Critical | [grub2] UEFI SecureBoot vulnerability + multiple flaws ... | Closed | |
Task Description
https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot/
https://9to5linux.com/grub2-boot-failure-issues-fixed-in-debian-and-ubuntu-update-now
|
|
Testing | Bug Report | Very Low | Critical | [Hyperbola GNU/Linux-libre 0.4] Installation issue for ... | Closed | |
Task Description
Description: Problem with execution of “pacstrap /mnt base base-devel syslinux” from 0.3.1-chroot ISO-image with modified pacman.conf and mirrorlist for testing. There are errors for the packages “libxcrypt” and “man-pages” as both have “/usr/share/man/man3/crypt.3.gz” and “/usr”share/man/man3/crypt_r.3.gz” included.
|
|
Testing | Bug Report | High | Critical | [Hyperbola GNU/Linux-libre 0.4] Installation for syslin ... | Closed | |
Task Description
Description: Configuration file “syslinux.cfg” under /boot/syslinux/ has to be adjusted. Problem with kernel-images loaded and the concurrent booting device is per default configured to /dev/sda3. Kernel-images are named as “linux-libre” not “linux-libre-lts”.
|
|
Testing | Bug Report | High | Critical | [Hyperbola GNU/Linux-libre 0.4] Problems with sndio fai ... | Closed | |
Task Description
There are issues with the current sndio-package as it seems not possible to get this to work with ALSA.
|
|
Testing | Bug Report | High | Critical | [wpa_supplicant]: wireless connection does not work | Closed | |
Task Description
Description:
Wireless connection does not work
Additional info: * package version(s)
- wpa_supplicant 2:2.9-1 - libressl 3.2.2-1
* config and/or log files etc.
Successfully initialized wpa_supplicant
OpenSSL: Failed to set cipher string 'DEFAULT@SECLEVEL=1'
SSL: Failed to initialize TLS context.
Failed to initialize EAPOL state machines.
nl80211: deinit ifname=wlp0s18f2u1 disabled_11b_rates=0
Steps to reproduce:
$ wpa_supplicant -B -i device-name -c <(wpa_passphrase “ssid” “psk”)
|
|
Any | Bug Report | Very High | Critical | [ath9k-htc-firmware]: not work | Closed | |
Task Description
Description:
Ath9k wifi device not working, possibly bad compilation or issues with gcc
Additional info: * package version(s)
- gcc-8.4.0-2 - ath9k-htc-firmware-1.4.0-8
* config and/or log files etc.
[ 8.302952] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested
[ 8.303011] usbcore: registered new interface driver ath9k_htc
[ 8.303067] usb 1-1: Direct firmware load for ath9k_htc/htc_9271-1.4.0.fw failed with error -2
[ 8.303073] usb 1-1: ath9k_htc: Firmware htc_9271.fw requested
[ 8.623141] usb 1-1: ath9k_htc: Transferred FW: htc_9271.fw, size: 51008
[ 9.683657] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive
[ 9.683672] ath9k_htc: Failed to initialize the device
Steps to reproduce:
- Add wifi device with ath9k firmware, for example: TL-WN722N - pacman -S ath9k-htc-firmware
References:
- https://bugzilla.kernel.org/show_bug.cgi?id=208251
|
|
Testing | Freedom Issue | Very Low | Critical | [Hyperbola GNU/Linux-libre 0.4] [lumina-core] has some ... | Closed | |
Task Description
The list contains some icons before being removed for displaying non-libre and trademark-related stuffs, which may infringe the GNU Free System Distribution Guidelines and Hyperbola Packaging Guidelines.
/usr/share/icons/material-design-{dark,light}/scalable/applications/:
Icons that are libre apps but has problematic issues:
nodejs.svg
npm.svg
umbraco.svg
Icons that are non-libre apps:
Icons that are non-libre games:
black-mesa.svg
minecraft.svg
Icons that are non-libre network services:
amazon.svg
appnet.svg (discontinued)
basecamp.svg
bing.svg
bitbucket.svg
blogger.svg
deviantart.svg
disqus.svg
dribbble.svg
dropbox.svg
ebay.svg
etsy.svg
facebook.svg
flattr.svg
foursquare.svg
github.svg
gmail.svg
google-drive.svg
google-maps.svg
google-photos.svg
google-play.svg
google-plus.svg (discontinued)
google-translate.svg
google-wallet.svg (discontinued, now as Google Pay)
instagram.svg
jsfiddle.svg
lastfm.svg
linkedin.svg
linode.svg
mixcloud.svg
onedrive.svg
pandora.svg
pinterest.svg
rdio.svg (discontinued)
reddit.svg
soundcloud.svg
spotify.svg
stackexchange.svg
stackoverflow.svg
telegram.svg
tumblr.svg
twitch.svg
twitter.svg
vimeo.svg
vine.svg (discontinued)
vk.svg
wechat.svg
xing.svg
yelp.svg
youtube.svg
Icons that are non-FSDG operating systems:
Icons that are non-libre operating systems:
Icons that are trademarked brands and products:
Icons that are trademarked characters:
|
|
Testing | Bug Report | High | Critical | Runit errors, | Closed | |
Task Description
/sbin/openrc-run: bad interpreter: No such file or directory
I get this error whenever I try to start dhcpcd with sv /etc/runit/
And for sndiod I get this doing the same guide,
warning: sndiod: unable to open supervise/ok: file does not exist
Although rather ironically, If I type sndiod or dhcpcd into root, it works just fine.
Maybe its an FHS issue or possibly, I am screwing up? I am not sure. Feedback is welcome.
This is what I did:
=⇒ Add a service:
ln -s /etc/sv/<service> /var/service
==> Start/stop/restart a service:
sv <start/stop/restart> <service>
more or less, I used this guide.
|
|
Testing | Bug Report | Very High | Critical | [Hyperbola GNU/Linux 0.4] QtSSL is not working | Closed | |
Task Description
Description: Tried with new compiled version of mumble no open and secured with SSL-certificate is reachable. Log within console:
qt.network.ssl: QSslSocket: cannot resolve SSL_CTX_set_options qt.network.ssl: QSslSocket: cannot resolve SSL_session_reused qt.network.ssl: QSslSocket: cannot resolve SSL_set_options qt.network.ssl: QSslSocket: cannot resolve BN_is_word qt.network.ssl: QSslSocket: cannot resolve SSL_in_init
<W>2021-08-23 01:00:18.814 QSslSocket: cannot call unresolved function sk_num
<W>2021-08-23 01:00:20.270 QSslSocket: cannot call unresolved function SSL_CTX_set_options
|
|
Testing | Implementation Request | High | Critical | [xlsfonts] Missing package needs to be added for xenoca ... | Closed | |
Task Description
Description: Package xlsfonts is missing and should absolutely being added also within groups for ‘xenocara-apps’ and ‘xorg-apps’.
|