Packages

Category Task Type Priority Severity Summary Status  asc Progress
AnyBackport RequestVery HighHigh [nodejs] backporting to nodejs LTS 8.11.3 Closed
100%
Task Description

Description:

Hi dear developers of Hyperbola. I work in the field of web development. I use a lot of javascript and nodejs to compile.
Could they do the nodejs update?. I also mention this because Hyperbola works with LTS packages.

Additional info:

* package version(s)

$ sudo pacman -Si nodejs
Repositorio               : community
Nombre                    : nodejs
Versión                   : 7.10.0-1
Descripción               : Evented I/O for V8 javascript
Arquitectura              : x86_64
URL                       : http://nodejs.org/
Licencias                 : MIT
Grupos                    : Nada
Provee                    : Nada
Depende de                : openssl-1.0  zlib  icu  libuv  http-parser  c-ares
Dependencias opcionales   : npm: nodejs package manager
En conflicto con          : Nada
Remplaza a                : Nada
Tamaño de la descarga     : 4,55 MiB
Tamaño de la instalación  : 18,49 MiB
Encargado                 : Felix Yan <felixonmars@archlinux.org>
Fecha de creación         : mié 03 may 2017 09:50:26 -05
Validado por              : Suma MD5  Suma SHA-256  Firma
$ sudo pacman -Si npm
Repositorio               : community
Nombre                    : npm
Versión                   : 4.5.0-1
Descripción               : A package manager for javascript
Arquitectura              : any
URL                       : https://www.npmjs.com/
Licencias                 : custom:Artistic
Grupos                    : Nada
Provee                    : nodejs-node-gyp
Depende de                : nodejs  semver
Dependencias opcionales   : python2: for node-gyp
En conflicto con          : Nada
Remplaza a                : Nada
Tamaño de la descarga     : 2,72 MiB
Tamaño de la instalación  : 13,98 MiB
Encargado                 : Felix Yan <felixonmars@archlinux.org>
Fecha de creación         : mié 12 abr 2017 22:08:06 -05
Validado por              : Suma MD5  Suma SHA-256  Firma

- NodeJS LTS (includes npm 5.6.0):

* https://nodejs.org/dist/v8.11.3/node-v8.11.3.tar.gz

* https://nodejs.org/dist/v8.11.3/SHASUMS256.txt.asc

Some errors that I suffer when compiling:
- https://stackoverflow.com/questions/46476741/nodejs-util-promisify-is-not-a-function

AnySecurity IssueVery HighCritical [openssh] CVE-2018-15473 Closed
100%
Task Description

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

https://security-tracker.debian.org/tracker/CVE-2018-15473

Patch: https://salsa.debian.org/ssh-team/openssh/commit/4641c58a3279f6b118f9562babaa0ee050a38619

Technical analysis: https://blog.nviso.be/2018/08/21/openssh-user-enumeration-vulnerability-a-close-look/

AnyFeature RequestVery HighHigh [gpsd]: contains systemd files Closed
100%
Task Description

Since Hyperbola follows the Init Freedom Campaign, systemd unit files removal is required or add OpenRC init scripts to replace it.

Additional info:
* package version(s)

extra/gpsd 3.16-3 [installed]

   GPS daemon and library to support USB/serial GPS devices

* config and/or log files etc.

Additional info:

Steps to reproduce: install it

AnySecurity IssueVery HighCritical [dropbear] CVE-2018-15599 Closed
100%
Task Description

User enumeration in Dropbear 2018.76 and earlier
http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html

Patch: https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00

AnySecurity IssueVery HighCritical [mutt] CVE-2018-14354 Closed
100%
Task Description

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.

https://security-tracker.debian.org/tracker/CVE-2018-14354

AnySecurity IssueVery HighCritical [iceweasel-uxp-noscript] Zero-day bypass and script exe ...Closed
100%
Task Description

Description:

NoScript zero-day allows script execution even with scripts blocked by default.

https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/

https://twitter.com/ma1/status/1039163003034324992

Additional info:
* package version(s) < 5.1.8.7

Steps to reproduce:
Set the Content-Type of your html/js page to “text/html;json” and enjoy full JS pwnage”

StableFeature RequestVery HighHigh [hiawatha]: remove systemd files, provide openrc Closed
100%
Task Description

Description:

Hiawatha contains only systemd files.

It shall be removed and openrc shall be provided

AnySecurity IssueVery HighCritical [util-linux] CVE-2018-7738 Closed
100%
Task Description

Description:
In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.

https://blog.grimm-co.com/post/malicious-command-execution-via-bash-completion-cve-2018-7738/

AnyFeature RequestVery HighHigh [umurmur] needs OpenRC init script and contains systemd ...Closed
100%
Task Description

Description:

  • needs OpenRC init script and contains systemd file

Additional info:

  • umurmur 0.2.16_a-6
umurmur /usr/lib/systemd/system/umurmur.service

Steps to reproduce:

  • none
AnyBug ReportVery HighHigh [openrc] needs a minor fix Closed
100%
Task Description

Description:

  • OpenRC needs a minor fix (remount proc)

Additional info:

  • openrc 0.28-19
openrc /usr/lib/rc/sh/init.sh

-        mount -n -t proc -o noexec,nosuid,nodev,gid=proc,hidepid=2 proc /proc
+        mount -n -t proc -o noexec,nosuid,nodev proc /proc
+        mount -n /proc -o remount,gid=26,hidepid=2

Steps to reproduce:

  • Boot OpenRC in chroot with unshare
AnySecurity IssueVery HighCritical [schroedinger] unmaintained and unsupportable Closed
100%
Task Description

Description:

  • Remove Schrödinger in Hyperbola because it’s unmaintained and unsupportable. [0] [1]
  • Note: It requires [ffmpeg], [ffmpeg2.8] and [gst-plugins-bad] rebuilding

Additional info:

  • schroedinger 1.0.11-3
$ pacman -Si schroedinger
Repository      : extra
Name            : schroedinger
Version         : 1.0.11-3
Description     : An implemenation of the Dirac video codec in ANSI C code
Architecture    : x86_64
URL             : https://launchpad.net/schroedinger
Licenses        : GPL2  LGPL2.1  MPL  MIT
Groups          : None
Provides        : None
Depends On      : orc  gcc-libs
Optional Deps   : None
Conflicts With  : None
Replaces        : None
Download Size   : 331.64 KiB
Installed Size  : 1676.00 KiB
Packager        : Evangelos Foutras <evangelos@foutrelis.com>
Build Date      : Sat 05 Dec 2015 12:28:01 PM -03
Validated By    : MD5 Sum  SHA-256 Sum  Signature

Steps to reproduce:

  • Contains security holes.
AnySecurity IssueVery HighCritical [vlc] CVE-2017-17670 Closed
100%
Task Description

Description:

  • In VideoLAN VLC media player through 2.2.8, there is a type conversion vulnerability in modules/demux/mp4/libmp4.c in the MP4 demux module leading to a invalid free, because the type of a box may be changed between a read operation and a free operation.

Additional info:
* package version(s)

  • 2.2.6-1.hyperbola1

* config and/or log files etc.

  • None

Steps to reproduce:

  • Run VLC
AnySecurity IssueVery HighCritical [vlc] CVE-2018-11529 Closed
100%
Task Description

Description:

  • VideoLAN VLC media player 2.2.x is prone to a use after free vulnerability which an attacker can leverage to execute arbitrary code via crafted MKV files. Failed exploit attempts will likely result in denial of service conditions.

Additional info:
* package version(s)

  • 2.2.6-1.hyperbola1

* config and/or log files etc.

  • None

Steps to reproduce:

  • Run VLC
AnySecurity IssueVery HighCritical [qtpass] Insecure Password Generation prior to 1.2.1 Closed
100%
Task Description

Description:
As stated on the home page of the project (https://qtpass.org/):
<quote>
All passwords generated with QtPass’ built-in password generator prior to 1.2.1 are possibly predictable and enumerable by hackers.
</quote>

AnyFreedom IssueVery HighCritical [qtemu] package recommends installing non-free OSes Closed
100%
Task Description

When running QtEmu for the first time and running the new machine wizard, the software lists non-free operating systems and refers to GNU/Linux as Linux.

It would be nice to list LibertyBSD in the list of distros in this software in addition to GNU/Linux and GNU/Hurd (which are listed in aqemu).

AnySecurity IssueVery HighCritical [toxcore] Memory leak - Remote DDoS vunerability Closed
100%
Task Description

Description:

A memory leak bug was discovered in Toxcore that can be triggered remotely to exhaust one’s system memory, resulting in a denial of service attack... As a general reminder, if you are still using irungentoo’s toxcore, we strongly encourage you to switch to using TokTok c-toxcore instead as it’s a lot more actively developed and maintained. In fact, irungentoo’s toxcore is neither being developed nor maintained for some time now, aside from merging only the most critical fixes from TokTok c-toxcore from time to time, missing all other important fixes.

Additional info:
* package version(s): < 2.8

https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/

AnySecurity IssueVery HighCritical [libssh] CVE-2018-10933 Closed
100%
Task Description

Description:
libssh versions 0.6 and above have an authentication bypass vulnerability in
the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message
in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect
to initiate authentication, the attacker could successfully authentciate
without any credentials.

Additional info:
* package version(s) : extra/libssh 0.7.5-1

CVE

AnySecurity IssueVery HighCritical [openldap] 2.4.44 multiple security issues Closed
100%
Task Description

Description:
Changelog

2.4.46 is fixing a huge quantity of issues (TLS related & memory leak)

Additional info:
* package version(s) : 2.4.44

AnyBug ReportVery HighHigh [mkinitcpio] consolefont and keymap hooks is adapted to ...Closed
100%
Task Description

Description:

  • “consolefont” and “keymap” hooks is adapted to systemd using /etc/vconsole.conf file, those hooks are needed to adapt to [openrc] with /etc/conf.d/consolefont and /etc/conf.d/keymaps

Additional info:

  • mkinitcpio 23-1.hyperbola3.1
/usr/lib/initcpio/install/consolefont
---
-        [[ -s /etc/vconsole.conf ]] && . /etc/vconsole.conf
+        [[ -s /etc/conf.d/consolefont ]] && . /etc/conf.d/consolefont

-        if [[ $FONT ]]; then
-            for file in "/usr/share/kbd/consolefonts/$FONT".@(fnt|psf?(u))?(.gz); do
+        if [[ $consolefont ]]; then
+            for file in "/usr/share/kbd/consolefonts/$consolefont".@(fnt|psf?(u))?(.gz); do

-            error "consolefont: requested font not found: \`%s'" "$FONT"
+            error "consolefont: requested font not found: \`%s'" "$consolefont"

-This hook loads consolefont specified in vconsole.conf during early 
-userspace.
+This hook loads consolefont specified in /etc/conf.d/consolefont during 
+early userspace.
/usr/lib/initcpio/install/keymap
---
-        for cfg in /etc/{vconsole,locale}.conf; do
+        for cfg in /etc/{conf.d/keymaps,locale}.conf; do

-        loadkeys -q $uc ${KEYMAP:-us} -b > "$BUILDROOT/keymap.bin"
+        loadkeys -q $uc ${keymap:-us} -b > "$BUILDROOT/keymap.bin"

-This hook loads keymap(s) specified in vconsole.conf during early 
-userspace.
+This hook loads keymap(s) specified in /etc/conf.d/keymaps during 
+early userspace.
Repository      : core
Name            : mkinitcpio
Version         : 23-1.hyperbola3.1
Description     : Modular initramfs image creation utility, with eudev support
Architecture    : any
URL             : https://projects.archlinux.org/mkinitcpio.git/
Licenses        : GPL
Groups          : None
Provides        : None
Depends On      : awk  mkinitcpio-busybox>=1.19.4-2  kmod  util-linux>=2.23  libarchive  coreutils  bash  findutils  grep  filesystem>=2011.10-1  gzip  eudev
Optional Deps   : xz: Use lzma or xz compression for the initramfs image
                  bzip2: Use bzip2 compression for the initramfs image
                  lzop: Use lzo compression for the initramfs image
                  lz4: Use lz4 compression for the initramfs image
                  mkinitcpio-nfs-utils: Support for root filesystem on NFS
Conflicts With  : None
Replaces        : None
Download Size   : 38.40 KiB
Installed Size  : 186.00 KiB
Packager        : André Silva <emulatorman@hyperbola.info>
Build Date      : Fri 05 Oct 2018 03:28:32 AM -03
Validated By    : MD5 Sum  SHA-256 Sum  Signature

Steps to reproduce:

  • Use “consolefont” and “keymap” hooks from mkinitcpio
AnySecurity IssueVery HighCritical [php] CVE-2017-9120 Closed
100%
Task Description

Description:

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

Additional info:
* package version(s)

$ pacman -Si php
Repositorio               : extra
Nombre                    : php
Versión                   : 7.1.4-3.hyperbola3
Descripción               : A general-purpose scripting language that is especially suited to web development, without systemd support
Arquitectura              : x86_64
URL                       : http://www.php.net
Licencias                 : PHP
Grupos                    : Nada
Provee                    : php-ldap=7.1.4
Depende de                : libxml2  curl  libzip  pcre
Dependencias opcionales   : Nada
En conflicto con          : php-ldap
Remplaza a                : php-ldap
Tamaño de la descarga     : 3,02 MiB
Tamaño de la instalación  : 15,94 MiB
Encargado                 : André Silva <emulatorman@hyperbola.info>
Fecha de creación         : mié 27 dic 2017 19:15:03 -05
Validado por              : Suma MD5  Suma SHA-256  Firma

* config and/or log files etc.

Last update of php be v7.1.x is v7.1.23:

- https://secure.php.net/ChangeLog-7.php#7.1.23

Patch availabble from v7.1.5
https://bugs.php.net/bug.php?id=74544

Steps to reproduce:

- Install php

StableFreedom IssueVery HighCritical [cool-retro-term] update package to 1.0.1 and remove no ...Closed
100%
Task Description

In the latest version fixes several issues and font improvements[1], but unfortunately there is a major problem contained five three non-libre/free typefaces in the source code.

  • Apple II (1977): a licence forbids to sell and modify. Already removed
  • Commodore PET (1977): a licence forbids to sell and modify. Already removed
  • Atari 400/800 (1979): in the latest version, there is a vague term “freeware”[2] in documentation, but forbids to sell and modify.
  • Commercial 64 (1982): a licence forbids to sell. Already removed
  • Monaco (modern): proprietary from Apple.
$ rm -fr "./app/qml/fonts/{1977-*,1979-atari-400-800,1982-commodore64,modern-monaco}/";

Also, I attached three QML source code diff files down below, by removing and replacing strings.

[1]: https://github.com/Swordfish90/cool-retro-term/releases/tag/1.0.1/
[2]: https://www.gnu.org/philosophy/words-to-avoid#Freeware

StableFreedom IssueVery HighCritical [xorg-fonts-misc] contains non-libre/free Syriac typefa ...Closed
100%
Task Description

A Syriac typeface family series of Beth Mardutho’s Meltho is considered as non-libre/free because a licence forbids to modify[1], and should be removed immediately.

[1]: https://github.com/freedesktop/xorg-misc-meltho/raw/master/license.txt

AnyFreedom IssueVery HighCritical [python-pip][python2-pip] Pip recommends proprietary so ...Closed
100%
Task Description

Description:
pip allows the user to search and install packages from the PyPi repository, which contains proprietary software.

Additional info:
* example of proprietary package in PyPi repository: https://pypi.org/project/snaplogic * Trisquel’s solution was to remove python-pip: https://trisquel.info/en/issues/3741

Steps to reproduce:
$ sudo pacman -S python-pip
$ pip search snaplogic # prints information about proprietary package
$ pip install snaplogic # installs proprietary package

AnyFreedom IssueVery HighCritical [purple-skypeweb] Plugin only useful with Skype Closed
100%
Task Description

Please remove as plugin is only useful with Skype hosted by a single company on a single server as far as I can tell (unlike pidgin-sipe).

StableFreedom IssueVery HighCritical [gftp] Remove many other (old and dead) FTP site bookma ...Closed
100%
Task Description

Contains many other (old and dead) non-FSDG distro and software archive and repo FTP sites, and must remove carefully.

AnyFreedom IssueVery HighCritical [man-pages] contains nonfree POSIX manual pages Closed
100%
AnyBug ReportVery HighCritical [linux-libre-lts] spinlock not released on kernel by i9 ...Closed
100%
AnyBug ReportVery HighCritical [electrum] package no longer works Closed
100%
StableSecurity IssueVery HighCritical [exim] CVE-2019-10149 Closed
100%
AnyFreedom IssueVery HighCritical [supertuxkart] remove nonfree Ubuntu Font Family fonts Closed
100%
AnyBug ReportVery HighCritical [cups] [cups-filters] ServerBin directory inconsistency Closed
100%
AnyFreedom IssueVery HighCritical [clementine] using non-free services and interfaces Closed
100%
AnyFreedom IssueVery HighCritical [gens] contains nonfree Starscream code Closed
100%
AnyFreedom IssueVery HighCritical [gens-gs] contains nonfree Starscream code and the Poor ...Closed
100%
AnyFreedom IssueVery HighCritical [dgen-sdl] contains nonfree CZ80, dZ80, DrZ80, Multi-Z8 ...Closed
100%
AnySecurity IssueVery HighCritical [libarchive] CVE-2019-18408 Closed
100%
AnySecurity IssueVery HighCritical [grub2] UEFI SecureBoot vulnerability + multiple flaws  ...Closed
100%
TestingBug ReportVery HighCritical [Hyperbola GNU/Linux 0.4] QtSSL is not working Closed
100%
TestingBug ReportHighHigh [sway] error while loading shared libraries Closed
100%
TestingBug ReportHighHigh [sddm] error while loading shared libraries Closed
100%
AnySecurity IssueHighHigh [npapi-sdk] remove unsecure/deprecated package Closed
100%
AnySecurity IssueHighHigh [npapi-vlc] remove unsecured package Closed
100%
AnySecurity IssueHighHigh [nspluginwrapper] remove unsecure/deprecated package Closed
100%
AnySecurity IssueHighHigh [x2goplugin] remove unsecure package Closed
100%
AnySecurity IssueHighHigh [djview] remove unsecure "nsdejavu.so" Closed
100%
AnySecurity IssueHighHigh [icedtea-web] remove unsecure "IcedTeaPlugin.so" Closed
100%
TestingBug ReportHighHigh [freerdp] error while loading shared libraries Closed
100%
TestingBug ReportHighHigh [ksystemlog] error while loading shared libraries Closed
100%
AnyDrop RequestHighHigh [devtools] remove this package Closed
100%
AnyPrivacy IssueHighHigh [redshift] remove geoclue2 support Closed
100%
Showing tasks 551 - 600 of 1517 Page 12 of 31

Available keyboard shortcuts

Tasklist

Task Details

Task Editing