G15 package website url invalid, leads to possible malware install
Bug #1805519 reported by
Nikolas Reist
This bug report is a duplicate of:
Bug #1468526: g15tools.com seems to be not anymore under control be g15tools.
Edit
Remove
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
g15composer (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
g15daemon (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
g15macro (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
g15mpd (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
g15stats (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
libg15 (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
libg15render (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
The External Resources website listed on https:/
If the site has moved or changed this should probably be updated.
Thanks,
description: | updated |
information type: | Public → Private Security |
information type: | Private Security → Public |
To post a comment you must log in.
While the status of the bug report from 2015 may be "Invalid" the fact is that https:/ /packages. ubuntu. com still references this website that has obviously been acquired for malicious purposes. People contributing on products that use this as a dependency may look to the package pages for these modules and attempt to access the site. It would helpful to change the website you are posting on your packages site to reflect that of the sourceforge site you referenced. Possible causes were outlined in the question that preceded this bug report along with notifying other potential package repository maintainers (like debian, etc...), both of which were suggested by a member of your staff.