*** This bug is a duplicate of bug 1468526 ***
    https://bugs.launchpad.net/bugs/1468526

While the status of the bug report from 2015 may be "Invalid" the fact
is that https://packages.ubuntu.com still references this website that
has obviously been acquired for malicious purposes. People contributing
on products that use this as a dependency may look to the package pages
for these modules and attempt to access the site. It would helpful to
change the website you are posting on your packages site to reflect that
of the sourceforge site you referenced. Possible causes were outlined in
the question that preceded this bug report along with notifying other
potential package repository maintainers (like debian, etc...), both of
which were suggested by a member of your staff.

** Description changed:

  The External Resources website listed on https://packages.ubuntu.com for
- the G15 packages leads to (in Chrome) a false extension install popup
- and what looks like a malicious site.
+ the G15 packages leads to (tested in Chrome) a false extension install
+ popup and what looks like a malicious site.
  
  http://www.g15tools.com/
  
  If the site has moved or changed this should probably be updated.
  
  Thanks,

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805519

Title:
  G15 package website url invalid, leads to possible malware install

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/g15composer/+bug/1805519/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to