|
Any | Security Issue | Very High | Critical | [networkmanager] CVE-2018-1111: DHCP client script code ... | Closed | |
Task Description
A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager which is configured to obtain network configuration using the DHCP protocol.
|
|
Any | Feature Request | Very Low | Critical | [openldap] needs OpenRC init script | Closed | |
Task Description
pacman -Si openldap Repository : core Name : openldap Version : 2.4.44-4.hyperbola3 Description : Lightweight Directory Access Protocol (LDAP) client and
server, with OpenRC support
Architecture : x86_64 URL : https://www.openldap.org/ Licenses : custom Groups : None Provides : None Depends On : libldap>=2.4.44 libltdl unixodbc Optional Deps : None Conflicts With : None Replaces : None Download Size : 1282.52 KiB Installed Size : 3990.00 KiB Packager : André Silva emulatorman@hyperbola.info Build Date : Wed 21 Feb 2018 08:09:38 PM CET Validated By : MD5 Sum SHA-256 Sum Signature
pacman -Ql openldap | grep /usr/lib/ openldap /usr/lib/ openldap /usr/lib/openldap/ openldap /usr/lib/openldap/accesslog-2.4.so.2 openldap /usr/lib/openldap/accesslog-2.4.so.2.10.7 openldap /usr/lib/openldap/accesslog.so openldap /usr/lib/openldap/auditlog-2.4.so.2 openldap /usr/lib/openldap/auditlog-2.4.so.2.10.7 openldap /usr/lib/openldap/auditlog.so openldap /usr/lib/openldap/collect-2.4.so.2 openldap /usr/lib/openldap/collect-2.4.so.2.10.7 openldap /usr/lib/openldap/collect.so openldap /usr/lib/openldap/constraint-2.4.so.2 openldap /usr/lib/openldap/constraint-2.4.so.2.10.7 openldap /usr/lib/openldap/constraint.so openldap /usr/lib/openldap/dds-2.4.so.2 openldap /usr/lib/openldap/dds-2.4.so.2.10.7 openldap /usr/lib/openldap/dds.so openldap /usr/lib/openldap/deref-2.4.so.2 openldap /usr/lib/openldap/deref-2.4.so.2.10.7 openldap /usr/lib/openldap/deref.so openldap /usr/lib/openldap/dyngroup-2.4.so.2 openldap /usr/lib/openldap/dyngroup-2.4.so.2.10.7 openldap /usr/lib/openldap/dyngroup.so openldap /usr/lib/openldap/dynlist-2.4.so.2 openldap /usr/lib/openldap/dynlist-2.4.so.2.10.7 openldap /usr/lib/openldap/dynlist.so openldap /usr/lib/openldap/memberof-2.4.so.2 openldap /usr/lib/openldap/memberof-2.4.so.2.10.7 openldap /usr/lib/openldap/memberof.so openldap /usr/lib/openldap/nssov.so openldap /usr/lib/openldap/nssov.so.0 openldap /usr/lib/openldap/nssov.so.0.0.0 openldap /usr/lib/openldap/pcache-2.4.so.2 openldap /usr/lib/openldap/pcache-2.4.so.2.10.7 openldap /usr/lib/openldap/pcache.so openldap /usr/lib/openldap/ppolicy-2.4.so.2 openldap /usr/lib/openldap/ppolicy-2.4.so.2.10.7 openldap /usr/lib/openldap/ppolicy.so openldap /usr/lib/openldap/refint-2.4.so.2 openldap /usr/lib/openldap/refint-2.4.so.2.10.7 openldap /usr/lib/openldap/refint.so openldap /usr/lib/openldap/retcode-2.4.so.2 openldap /usr/lib/openldap/retcode-2.4.so.2.10.7 openldap /usr/lib/openldap/retcode.so openldap /usr/lib/openldap/rwm-2.4.so.2 openldap /usr/lib/openldap/rwm-2.4.so.2.10.7 openldap /usr/lib/openldap/rwm.so openldap /usr/lib/openldap/seqmod-2.4.so.2 openldap /usr/lib/openldap/seqmod-2.4.so.2.10.7 openldap /usr/lib/openldap/seqmod.so openldap /usr/lib/openldap/sssvlv-2.4.so.2 openldap /usr/lib/openldap/sssvlv-2.4.so.2.10.7 openldap /usr/lib/openldap/sssvlv.so openldap /usr/lib/openldap/syncprov-2.4.so.2 openldap /usr/lib/openldap/syncprov-2.4.so.2.10.7 openldap /usr/lib/openldap/syncprov.so openldap /usr/lib/openldap/translucent-2.4.so.2 openldap /usr/lib/openldap/translucent-2.4.so.2.10.7 openldap /usr/lib/openldap/translucent.so openldap /usr/lib/openldap/unique-2.4.so.2 openldap /usr/lib/openldap/unique-2.4.so.2.10.7 openldap /usr/lib/openldap/unique.so openldap /usr/lib/openldap/valsort-2.4.so.2 openldap /usr/lib/openldap/valsort-2.4.so.2.10.7 openldap /usr/lib/openldap/valsort.so openldap /usr/lib/slapd
|
|
Stable | Security Issue | Very High | Critical | [iceweasel-uxp] Issue with HTTPS websites | Closed | |
Task Description
With latest iceweasel-uxp, I can’t connect to some HTTPS websites :
For example :
https://pkgs.fedoraproject.org/ is an example
SEC_ERROR_UNKNOWN_ISSUER
|
|
Any | Security Issue | Very Low | Critical | [toxcore] Memory leak bug | Closed | |
Task Description
Description: https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/
The bug is fixed in TokTok c-toxcore v0.2.8. The bug is also fixed in the master branch of irungentoo’s toxcore, in commit bf69b54f64003d160d759068f4816b2d9b2e1e21. As a general reminder, if you are still using irungentoo’s toxcore, we strongly encourage you to switch to using TokTok c-toxcore instead as it’s a lot more actively developed and maintained.
|
|
Any | Bug Report | Very Low | Critical | [msmtp] needs libressl | Closed | |
Task Description
Description:
I may be wrong for I did not migrate to 0.3 as of yet, but I think that `msmtp` has been forgotten and needs to be recompiled with `libressl`.
Please remove this report if I am mistaken.
|
|
Testing | Bug Report | Very Low | Critical | [msmtp] needs libressl | Closed | |
Task Description
Description:
I may be wrong for I did not migrate to 0.3 as of yet, but I think that `msmtp` has been forgotten and needs to be recompiled with `libressl`.
Please remove this report if I am mistaken.
|
|
Stable | Security Issue | Very Low | Critical | [lts-kernel][sec] filter /dev/mem access & restrict acc ... | Closed | |
Task Description
These two options could be enabled :
Kernel hacking → [*] Filter access to /dev/mem [*] Filter I/O access to /dev/mem
Security options → [*] Restrict unprivileged access to the kernel syslog
|
|
Any | Security Issue | Very Low | Critical | [opensmtpd] CVE-2020-8794 | Closed | |
Task Description
Description: https://www.openwall.com/lists/oss-security/2020/02/24/5 https://www.bleepingcomputer.com/news/security/new-critical-rce-bug-in-openbsd-smtp-server-threatens-linux-distros/
Qualys Security Advisory
LPE and RCE in OpenSMTPD’s default install (CVE-2020-8794)
Summary Analysis ... Acknowledgments
We discovered a vulnerability in OpenSMTPD, OpenBSD’s mail server. This vulnerability, an out-of-bounds read introduced in December 2015 (commit 80c6a60c, “when peer outputs a multi-line response ...”), is exploitable remotely and leads to the execution of arbitrary shell commands: either as root, after May 2018 (commit a8e22235, “switch smtpd to new grammar”); or as any non-root user, before May 2018.
Because this vulnerability resides in OpenSMTPD’s client-side code (which delivers mail to remote SMTP servers), we must consider two different scenarios:
- Client-side exploitation: This vulnerability is remotely exploitable
in OpenSMTPD's (and hence OpenBSD's) default configuration. Although
OpenSMTPD listens on localhost only, by default, it does accept mail
from local users and delivers it to remote servers. If such a remote
server is controlled by an attacker (either because it is malicious or
compromised, or because of a man-in-the-middle, DNS, or BGP attack --
SMTP is not TLS-encrypted by default), then the attacker can execute
arbitrary shell commands on the vulnerable OpenSMTPD installation.
- Server-side exploitation: First, the attacker must connect to the
OpenSMTPD server (which accepts external mail) and send a mail that
creates a bounce. Next, when OpenSMTPD connects back to their mail
server to deliver this bounce, the attacker can exploit OpenSMTPD's
client-side vulnerability. Last, for their shell commands to be
executed, the attacker must (to the best of our knowledge) crash
OpenSMTPD and wait until it is restarted (either manually by an
administrator, or automatically by a system update or reboot).
We developed a simple exploit for this vulnerability and successfully tested it against OpenBSD 6.6 (the current release), OpenBSD 5.9 (the first vulnerable release), Debian 10 (stable), Debian 11 (testing), and Fedora 31.
The fix is delivered in OpenSMTPD 6.6.4p1, available here, which the developer recommends installing “AS SOON AS POSSIBLE.”
|
|
Any | Freedom Issue | Very High | Critical | [aarch64-linux-gnu-linux-api-headers] compiles using b ... | Closed | |
Task Description
The aarch64-linux-gnu-linux-api-headers package from [community] compiles using the blobbed Linux kernel source[0], at Parabola it has been replaced with aarch64-linux-gnu-linux-libre-api-headers[1], since this issue is exactly the same as with linux-api-headers.
The solution is to simply compile using Linux-libre sources.
[0] https://git.archlinux.org/svntogit/community.git/plain/aarch64-linux-gnu-linux-api-headers/trunk/PKGBUILD
[1] https://git.parabola.nu/abslibre.git/commit/?id=acaa4ba9c0bc77deb6b77e4dad815f66c673d662
|
|
Stable | Bug Report | Very Low | Critical | [hypervideo] YouTube's DRM has prevented this software ... | Closed | |
Task Description
With the recent update to hypervideo, my workflow is broken as I can’t archive several youtube channels with hypervideo, the error is always the following :
WARNING: unable to extract html5 player; please report this issue on https://issues.hyperbola.info/ . Make sure you are using the latest version; type 'pacman -Sy hypervideo' as root. Be sure to call hypervideo with the --verbose flag and include its complete output.
[youtube] {22} signature length 44.40, html5 player None
ERROR: Signature extraction failed: Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1194, in _decrypt_signature
video_id, player_url, s
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1127, in _extract_signature_function
raise ExtractorError("YouTube's DRM has prevented this software from obtaining the video URL", expected=True)
hypervideo.utils.ExtractorError: YouTube's DRM has prevented this software from obtaining the video URL
(caused by ExtractorError("YouTube's DRM has prevented this software from obtaining the video URL",)); please report this issue on https://issues.hyperbola.info/ . Make sure you are using the latest version; type 'pacman -Sy hypervideo' as root. Be sure to call hypervideo with the --verbose flag and include its complete output.
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1194, in _decrypt_signature
video_id, player_url, s
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1127, in _extract_signature_function
raise ExtractorError("YouTube's DRM has prevented this software from obtaining the video URL", expected=True)
hypervideo.utils.ExtractorError: YouTube's DRM has prevented this software from obtaining the video URL
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1194, in _decrypt_signature
video_id, player_url, s
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1127, in _extract_signature_function
raise ExtractorError("YouTube's DRM has prevented this software from obtaining the video URL", expected=True)
hypervideo.utils.ExtractorError: YouTube's DRM has prevented this software from obtaining the video URL
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/hypervideo/YoutubeDL.py", line 792, in extract_info
ie_result = ie.extract(url)
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/common.py", line 508, in extract
ie_result = self._real_extract(url)
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1806, in _real_extract
encrypted_sig, video_id, player_url, age_gate)
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1204, in _decrypt_signature
'Signature extraction failed: ' + tb, cause=e)
hypervideo.utils.ExtractorError: Signature extraction failed: Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1194, in _decrypt_signature
video_id, player_url, s
File "/usr/lib/python3.6/site-packages/hypervideo/extractor/youtube.py", line 1127, in _extract_signature_function
raise ExtractorError("YouTube's DRM has prevented this software from obtaining the video URL", expected=True)
hypervideo.utils.ExtractorError: YouTube's DRM has prevented this software from obtaining the video URL
(caused by ExtractorError("YouTube's DRM has prevented this software from obtaining the video URL",)); please report this issue on https://issues.hyperbola.info/ . Make sure you are using the latest version; type 'pacman -Sy hypervideo' as root. Be sure to call hypervideo with the --verbose flag and include its complete output.
|
|
Stable | Bug Report | Very Low | Critical | [python2-reportlab] python2-pip dependency | Closed | |
Task Description
Since python-pip and python2-pip have been removed, I can’t install python2-reportlab because python2-pip is a dependency of this package. .
|
|
Any | Bug Report | Very Low | Critical | [system-config-printer] Impossible to print some pdfs ( ... | Closed | |
Task Description
Hello,
I’m unable to print some pdfs on my Hyperbola 3.0 system. Some background :
cups is installed, service enabled and working system-config-printer is installed and my printer has been correctly added.
I can print most pdfs and text files but recently with a pdf, it fails to print it.* And system-config-printer returned the following error (see capture) :
Printer "EPSON XP-620-Series" requires the '/usr/lib/cups/filters/epson-escpr-wrapper' but it is not currently installed.
Currently, “epson-escpr-wrapper” is installed but it is in :
/usr/libexec/cups/filters/epson-escpr-wrapper
Looking at source code of system-config-printer, it expects that wrapper to be installed in “/usr/lib/” so I tried to symlink that “epson-escpr-wrapper” to “/usr/lib/cups/filters” but it doesn’t work..
*With a Debian system and the exact same configuration, the “problematic” pdf prints just fine so it is not an issue with the pdf.
|
|
Stable | Freedom Issue | Very Low | Critical | [elementary-icon-theme] Contains non-FSDG compliant dis ... | Closed | |
Task Description
About that distro, Elementary OS is semi-libre/free, Ubuntu based, long term support, but does not comply with the GNU Free System Distributibution Guidelines (FSDG). To either rebrand or remove existing non-FSDG compliant distro icon files.
The following affected files are present in this list:
/usr/share/icons/elementary/places/16/distributor-logo.svg
/usr/share/icons/elementary/places/24/distributor-logo.svg
/usr/share/icons/elementary/places/32/distributor-logo.svg
/usr/share/icons/elementary/places/48/distributor-logo.svg
/usr/share/icons/elementary/places/64/distributor-logo.svg
/usr/share/icons/elementary/places/128/distributor-logo.svg
/usr/share/icons/elementary/places/symbolic/distributor-logo-symbolic.svg
|
|
Stable | Drop Request | Very Low | Critical | [osdbattery] Unmaintained and unsupportable | Closed | |
Task Description
osdbattery is (probably) useless and broken so Conky did compete because It is still unmaintained and unsupported over 14 years ago (last released version 1.4 on August 23, 2005), and should be removed per anti-abandonware rule at the packaging guidelines.
Also, the default config file contains non-libre/free Microsoft font Verdana as X11 font format property in font variable.
|
|
Any | Security Issue | Very Low | Critical | [unbound] Multiple CVEs | Closed | |
Task Description
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
[Critical] https://security-tracker.debian.org/tracker/CVE-2019-18934
|
|
Testing | Freedom Issue | Very Low | Critical | [Hyperbola GNU/Linux-libre 0.4] [lumina-core] has some ... | Closed | |
Task Description
The list contains some icons before being removed for displaying non-libre and trademark-related stuffs, which may infringe the GNU Free System Distribution Guidelines and Hyperbola Packaging Guidelines.
/usr/share/icons/material-design-{dark,light}/scalable/applications/:
Icons that are libre apps but has problematic issues:
nodejs.svg
npm.svg
umbraco.svg
Icons that are non-libre apps:
Icons that are non-libre games:
black-mesa.svg
minecraft.svg
Icons that are non-libre network services:
amazon.svg
appnet.svg (discontinued)
basecamp.svg
bing.svg
bitbucket.svg
blogger.svg
deviantart.svg
disqus.svg
dribbble.svg
dropbox.svg
ebay.svg
etsy.svg
facebook.svg
flattr.svg
foursquare.svg
github.svg
gmail.svg
google-drive.svg
google-maps.svg
google-photos.svg
google-play.svg
google-plus.svg (discontinued)
google-translate.svg
google-wallet.svg (discontinued, now as Google Pay)
instagram.svg
jsfiddle.svg
lastfm.svg
linkedin.svg
linode.svg
mixcloud.svg
onedrive.svg
pandora.svg
pinterest.svg
rdio.svg (discontinued)
reddit.svg
soundcloud.svg
spotify.svg
stackexchange.svg
stackoverflow.svg
telegram.svg
tumblr.svg
twitch.svg
twitter.svg
vimeo.svg
vine.svg (discontinued)
vk.svg
wechat.svg
xing.svg
yelp.svg
youtube.svg
Icons that are non-FSDG operating systems:
Icons that are non-libre operating systems:
Icons that are trademarked brands and products:
Icons that are trademarked characters:
|
|
Testing | Implementation Request | High | Critical | [xlsfonts] Missing package needs to be added for xenoca ... | Closed | |
Task Description
Description: Package xlsfonts is missing and should absolutely being added also within groups for ‘xenocara-apps’ and ‘xorg-apps’.
|
|
Any | Freedom Issue | Very High | Critical | [cmake-fedora] useful only for non-FSDG distros | Closed | |
Task Description
$ pacman -Si cmake-fedora Repository : community Name : cmake-fedora Version : 2.7.1-3 Description : CMake helper modules for fedora developers Architecture : any URL : https://pagure.io/cmake-fedora Licenses : custom:BSD Groups : None Provides : None Depends On : cmake Optional Deps : None Conflicts With : None Replaces : None Download Size : 90.94 KiB Installed Size : 422.00 KiB Packager : Felix Yan felixonmars@archlinux.org Build Date : Mon 17 Apr 2017 06:39:49 AM -03 Validated By : MD5 Sum SHA-256 Sum Signature
|
|
Testing | Bug Report | Medium | Critical | [iceweasel-uxp-ublock-origin] Can't add filters and/or ... | Closed | |
Task Description
I can’t update filters or update with iceweasel-uxp-ublock-origin. When I toggle the additional filters list, it is empty.
|
|
Testing | Bug Report | Very Low | Critical | [iceweasel-uxp] missing extensions | Closed | |
Task Description
Hello,
I can’t manually install some extensions I was using successfully with iceweasel-esr (52.9.x) previously. Notably :
https-everywhere https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/ watch-with-mpv https://addons.mozilla.org/en-US/firefox/addon/watch-with-mpv/ tampermonkey https://addons.mozilla.org/en-US/firefox/addon/tampermonkey/ Save URL to Wayback Machine https://addons.mozilla.org/en-US/firefox/addon/save-url-to-wayback-machine
How to install them with iceweasel-uxp ?
|
|
Stable | Bug Report | High | Critical | [postfix][FHS] multiple issues, need rebuilding | Closed | |
Task Description
Description: Postfix is a mess, first it failed to start (running ‘postfix start’) with the following:
postfix: fatal: chdir(/usr/lib/postfix/bin): No such file or directory
Then, to solve this, I symlinked /usr/libexec/postfix to /usr/lib/postfix/bin, because there were the binaries, but then it came with the following:
# postfix start
/usr/lib/postfix/bin/postfix-script: line 89: /usr/bin/postconf: No such file or directory
/usr/lib/postfix/bin/postfix-script: line 90: /usr/bin/postlog: No such file or directory
Because all the post* bins where now in /usr/sbin, so I symlinked them to /usr/bin, and it could finally run, but with many warnings
# postfix start
postfix/postfix-script: warning: symlink leaves directory: /usr/lib/postfix/./bin
postfix/postfix-script: warning: not owned by group postdrop: /usr/bin/postqueue
postfix/postfix-script: warning: not owned by group postdrop: /usr/bin/postdrop
postfix/postfix-script: warning: not set-gid or not owner+group+world executable: /usr/bin/postqueue
postfix/postfix-script: warning: not set-gid or not owner+group+world executable: /usr/bin/postdrop
postfix/postfix-script: starting the Postfix mail system
Additional info: * postfix 3.2.2-1.hyperbola6
|
|
Any | Security Issue | Medium | Critical | [libjpeg-turbo] CVE-2019-2201 | Closed | |
Task Description
In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation
https://security-tracker.debian.org/tracker/CVE-2019-2201
Patch: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/388
|
|
Any | Implementation Request | Very High | Critical | [linux-libre-lts-server] add "Linux-libre" kernel adapt ... | Closed | |
Task Description
Description:
Additional info:
Steps to reproduce:
|
|
Any | Bug Report | Very High | Critical | [python-acme] to start crashing on June 19th | Closed | |
Task Description
Description: Quoted from https://bugs.launchpad.net/ubuntu/+source/python-acme/+bug/1777205 Bug #1777205 reported by Brad Warren on 2018-06-16
[Impact]
Without this fix, on June 19, the library will start to fail when using Let’s Encrypt’s new ACMEv2 endpoint. We should avoid breaking this for users.
[Test Case]
On June 19, try to use Let’s Encrypt’s new ACMEv2 endpoint; it will error out, as described in https://community.letsencrypt.org/t/acmev2-order-ready-status/62866
[Regression Potential]
If the endpoint changes again, this will need another update, but the only potential regression I see is server-side, which needs patches on our end to adjust (like in this case).
[Original Bug Description]
I am the upstream maintainer of python-acme. This bug only affects python-acme in Ubuntu 18.04.
Starting on June 19th, this library will start failing when used with Let’s Encrypt’s new ACMEv2 endpoint. This is because the library does not recognize the changes described in https://community.letsencrypt.org/t/acmev2-order-ready-status/62866 and will error out when it sees them.
To fix this, python-acme either needs to be upgraded to 0.25.1 (which came out two days ago) or the one line patch that originally landed upstream at https://github.com/certbot/certbot/commit/5940ee92ab5c9a9f05f7067974f6e15c9fa3205a applied. I think the latter is the safer option.
Please let me know what I can do to help get this resolved.
Additional info: Solution is to upgrade the following packages
* certbot 0.23.0-1.hyperbola1.backports1 * python-acme 0.23.0-1.backports1
and any other that depends on certbot=0.23.0 and/or python-acme=0.23.0 (like the certbot plugins)
The other option is to patch certbot, as described in the launchpad’s issue
Steps to reproduce:
1) Install certbot 2) try anything related to the certificates (certonly, renew) 3) You may get an error like this:
Obtaining a new certificate
An unexpected error occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/josepy/json_util.py", line 280, in fields_from_json
fields[slot] = field.decode(value)
File "/usr/lib/python3.6/site-packages/josepy/json_util.py", line 88, in decode
return self.fdec(value)
File "/usr/lib/python3.6/site-packages/acme/messages.py", line 123, in from_json
'{0} not recognized'.format(cls.__name__))
josepy.errors.DeserializationError: Deserialization error: Status not recognized
During handling of the above exception, another exception occurred:
josepy.errors.DeserializationError: Deserialization error: Could not decode 'status' ('ready'): Deserialization error: Status not recognized
Please see the logfiles in /var/log/letsencrypt for more details.
|
|
Stable | Bug Report | Very High | Critical | [iceweasel-uxp] Broken addons with latest update | Closed | |
Task Description
Some addons are currently broken with latest iceweasel-uxp (iceweasel-uxp 52.9.20190926-1)
DownThemAll Save to Wayback Machine Self-Destructing Cookies (and probably others)
g4jc suggested to drop PGO as it could be the culprit.
https://forums.hyperbola.info/viewtopic.php?pid=1149#p1149
Regarding addons, I'm fairly certain flipping the switch on PGO (which makes the browser faster at the expense of wrecking code) is the culprit. We were warned not to use it, and this is planned to be rolled back.
However, Hyperbot has to be scheduled to rebuild the packages and I do not set it's schedule. Will advise.
|
|
Stable | Bug Report | Medium | Critical | [torsocks] which: no getcap | Closed | |
|
|
Any | Freedom Issue | Very Low | Critical | [conky] Some serious issues | Closed | |
|
|
Any | Privacy Issue | Very Low | Critical | [bleachbit] needs to be adapted to UXP applications | Closed | |
|
|
Stable | Bug Report | Very Low | Critical | [smartmontools] update-smart-drivedb fails to update | Closed | |
|
|
Testing | Bug Report | High | Critical | [Hyperbola GNU/Linux-libre 0.4] Problems with sndio fai ... | Closed | |
|
|
Any | Bug Report | Very High | Critical | [ath9k-htc-firmware]: not work | Closed | |
|
|
Any | Security Issue | Very High | Critical | [gnome-mplayer] [gecko-mediaplayer] [gmtk] remove unsec ... | Closed | |
|
|
Any | Security Issue | Very High | Critical | [freewrl] remove unsecure "libFreeWRLplugin.so" | Closed | |
|
|
Any | Security Issue | Very High | Critical | [xulrunner] unmaintained and unsupportable | Closed | |
|
|
Any | Freedom Issue | Very High | Critical | [cataclysm-dda] uses CC BY-SA for software | Closed | |
|
|
Any | Security Issue | Very High | Critical | [midori] unmaintained and unsupportable | Closed | |
|
|
Any | Security Issue | Very High | Critical | [w3m] unmaintained and unsupportable | Closed | |
|
|
Any | Security Issue | Very High | Critical | [pam] pam_unix2 is orphaned and dead upstream | Closed | |
|
|
Any | Security Issue | Very High | Critical | [wpa_supplicant] vulnerable to KRAK attack | Closed | |
|
|
Any | Security Issue | Very High | Critical | [dillo] enable IPv6, SSL/TLS and threaded DNS support | Closed | |
|
|
Testing | Privacy Issue | Very High | Critical | [abiword] remove AltaVista's Babel Fish translator supp ... | Closed | |
|
|
Any | Privacy Issue | Very High | Critical | [libreoffice*] contains Google API keys | Closed | |
|
|
Any | Freedom Issue | Very High | Critical | [aarch64-linux-gnu-linux-api-headers] compiles using b ... | Closed | |
|
|
Any | Security Issue | Very High | Critical | [linux-libre-lts*] Meltdown & Spectre Vulnerability | Closed | |
|
|
Any | Security Issue | Very High | Critical | [libressl] add package as OpenSSL replacement and defau ... | Closed | |
|
|
Stable | Bug Report | High | Critical | [vhba-module-lts] modprobe: ERROR: could not insert 'vh ... | Closed | |
|
|
Any | Security Issue | Very High | Critical | [electrum] JSONRPC vulnerability | Closed | |
|
|
Any | Security Issue | High | Critical | [irssi] IRSSI-SA-2018-02 Irssi Security Advisory | Closed | |
|
|
Any | Feature Request | High | Critical | [pacman-key][cronie][fcron] eating up hardware resource ... | Closed | |
|
|
Any | Security Issue | High | Critical | [python2] heap-overflow vulnerability CVE-2018-1000030 | Closed | |
|