aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T11:33:22Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8727apache2: Multiple vulnerabilities (CVE-2017-15710, CVE-2017-15715, CVE-2018-1...2019-07-23T11:33:22ZAlicha CHapache2: Multiple vulnerabilities (CVE-2017-15710, CVE-2017-15715, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1283, CVE-2018-1312)CVE-2017-15710: Out of bound write in mod\_authnz\_ldap when using too small Accept-Language values
---------------------------------------------------------------------------------------------------
### Affected Versions:
httpd 2.4.1 ...CVE-2017-15710: Out of bound write in mod\_authnz\_ldap when using too small Accept-Language values
---------------------------------------------------------------------------------------------------
### Affected Versions:
httpd 2.4.1 to 2.4.29
### Fixed in:
Apache httpd 2.4.30
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
CVE-2017-15715: <FilesMatch> bypass with a trailing newline in the file name
----------------------------------------------------------------------------
The expression specified in <FilesMatch> could match ‘$’ to a newline
character in a malicious filename, rather than matching only the end of
the filename.
This could be exploited in environments where uploads of some files are
are externally blocked, but only by matching the trailing portion of the
filename.
### Affected Versions:
httpd 2.4.1 to 2.4.29
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
http://openwall.com/lists/oss-security/2018/03/24/6
CVE-2018-1301: Possible out of bound access after failure in reading the HTTP request
-------------------------------------------------------------------------------------
A specially crafted request could have crashed the Apache HTTP Server
prior to
version 2.4.30, due to an out of bound access after a size limit is
reached by
reading the HTTP header.
Affected Versions:
httpd 2.4.1 to 2.4.29
### Fixed in:
Apache httpd 2.4.30
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
http://openwall.com/lists/oss-security/2018/03/24/2
CVE-2018-1302: Possible write of after free on HTTP/2 stream shutdown
---------------------------------------------------------------------
When an HTTP/2 stream was destroyed after being handled, the Apache HTTP
Server prior to version 2.4.30
could have written a NULL pointer potentially to an already freed
memory.
### Affected Versions:
httpd 2.4.17 to 2.4.29
### Fixed in:
Apache httpd 2.4.30
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
http://openwall.com/lists/oss-security/2018/03/24/5
CVE-2018-1303: Possible out of bound read in mod\_cache\_socache
----------------------------------------------------------------
A specially crafted HTTP request header could have crashed the Apache
HTTP Server prior to version 2.4.30 due to an out of bound read
while preparing data to be cached in shared memory. It could be used as
a Denial of Service attack against users of mod\_cache\_socache.
### Affected Versions:
httpd 2.4.6 to 2.4.29
### Fixed in:
Apache httpd 2.4.30
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
http://openwall.com/lists/oss-security/2018/03/24/3
CVE-2018-1283: Tampering of mod\_session data for CGI applications
------------------------------------------------------------------
When mod\_session is configured to forward its session data to CGI
applications (SessionEnv on, not the default), a remote user may
influence their content by
using a “Session” header. This comes from the “HTTP\_SESSION” variable
name used by mod\_session to forward its data to CGIs, since the prefix
“HTTP\_” is
also used by the Apache HTTP Server to pass HTTP header fields, per CGI
specifications.
### Affected Versions:
httpd 2.4.1 to 2.4.29
### Fixed in:
Apache httpd 2.4.30
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
http://openwall.com/lists/oss-security/2018/03/24/4
CVE-2018-1312: Weak Digest auth nonce generation in mod\_auth\_digest
---------------------------------------------------------------------
When generating an HTTP Digest authentication challenge, the nonce sent
to prevent reply attacks was not correctly generated using a
pseudo-random seed.
In a cluster of servers using a common Digest authentication
configuration, HTTP requests could be replayed across servers by an
attacker without detection.
### Affected Versions:
httpd 2.4.1 to 2.4.29
### Fixed in:
Apache httpd 2.4.30
### References:
https://httpd.apache.org/security/vulnerabilities\_24.html
*(from redmine: issue id 8727, created on 2018-03-26, closed on 2018-03-29)*
* Relations:
* copied_to #8728
* copied_to #8729
* copied_to #8730
* copied_to #8731
* copied_to #8732
* child #8728
* child #8729
* child #8730
* child #8731
* child #8732Kaarle RitvanenKaarle Ritvanenhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8726openrc docker init does not use system proxy2022-02-20T22:04:28ZSimon Alpineopenrc docker init does not use system proxydockerd started by /etc/init.d/docker does not honor the proxy
configured by setup-proxy.
1. repro:
1. setup-proxy http://192.0.2.1:8080
2. rc-service docker restart
<!-- -->
1. docker pull alpine:latest
Error response from ...dockerd started by /etc/init.d/docker does not honor the proxy
configured by setup-proxy.
1. repro:
1. setup-proxy http://192.0.2.1:8080
2. rc-service docker restart
<!-- -->
1. docker pull alpine:latest
Error response from daemon: Get https://registry-1.docker.io/v2/:
dial tcp 34.200.90.16:443: connect: network is unreachable
2. fix:
load proxy environment variables in /etc/init.d/docker
—- /etc/init.d/docker.orig
<span class="underline"></span>+ /etc/init.d/docker
@@ –32,5 +32,9 @@
\# in the kernel. We recommend using cgroups to do container-local
accounting.
ulimit -p unlimited
\+ if [-e /etc/profile.d/proxy.sh](-e_/etc/profile.d/proxy.sh); then
+ source /etc/profile.d/proxy.sh
+ fi
+
return 0
}
*(from redmine: issue id 8726, created on 2018-03-25)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8725Squid 3.5.27 Intel2021-02-06T17:41:58ZRandy SchusterSquid 3.5.27 IntelAlpine Intel Squid package experiences segmentation faults many times a
day when ran on VMware 14 Player 64-bit or Intel® Pentium® Processor
N3700 hardware.
Recompiled squid from http://www.squid-cache.org on the N3700 seems to
have res...Alpine Intel Squid package experiences segmentation faults many times a
day when ran on VMware 14 Player 64-bit or Intel® Pentium® Processor
N3700 hardware.
Recompiled squid from http://www.squid-cache.org on the N3700 seems to
have resolved the issue for that system.
Samples messages from the VMware instance are listed below.
Mar 11 12:36:00 squid local4.notice squid\[3747\]: Squid Parent:
(squid-1) process 3749 exited due to signal 11 with status 0
Mar 11 12:36:00 squid kern.info kernel: \[ 9167.609068\] squid\[3749\]:
segfault at 73e700000028 ip 000009c763e64599 sp 000078901080c110 error 4
in squid\[9c763bb6000+471000\]
Mar 11 12:36:00 squid kern.alert kernel: \[ 9167.609092\] grsec: From
192.168.72.1: Segmentation fault occurred at 000073e700000028 in
/usr/sbin/squid\[squid:3749\] uid/euid:31/31 gidMar 11 12:36:00 squid
kern.alert kernel: \[ 9167.609103\] grsec: From 192.168.72.1: denied
resource overstep by requesting 4096 for RLIMIT\_CORE against limit 0
for /usr/sbin/squid\[sMar 11 12:36:00 squid kern.alert kernel: \[
9167.609110\] grsec: From 192.168.72.1: bruteforce prevention initiated
for the next 30 minutes or until service restarted, stalling each
*(from redmine: issue id 8725, created on 2018-03-24)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8724Keyboard layout on tty overwritten after upgrade2020-01-19T15:02:46ZalgitbotKeyboard layout on tty overwritten after upgradeAfter upgrading to edge, my keyboard layout on tty changed to US (I
think).
Hard to use it when I press a key and the result on screen is different.
*(from redmine: issue id 8724, created on 2018-03-24)*After upgrading to edge, my keyboard layout on tty changed to US (I
think).
Hard to use it when I press a key and the result on screen is different.
*(from redmine: issue id 8724, created on 2018-03-24)*3.8.5https://gitlab.alpinelinux.org/alpine/aports/-/issues/8723abuild -F fails with "Do not run as root"2020-01-19T15:02:02Zalgitbotabuild -F fails with "Do not run as root"I suppose it’s because it invokes itself internally but loses the -F
flag
*(from redmine: issue id 8723, created on 2018-03-24)*I suppose it’s because it invokes itself internally but loses the -F
flag
*(from redmine: issue id 8723, created on 2018-03-24)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8722zip-source unpacking error2020-01-19T15:00:28Zalgitbotzip-source unpacking errorIt seems the ftp-server does not return correct info about the download:
<code class="text">
bui@localhost:~/dyn/zip$ abuild unpack
>>> zip: Fetching ftp://ftp.info-zip.org/pub/infozip/src/zip30.zip
% Total % Receiv...It seems the ftp-server does not return correct info about the download:
<code class="text">
bui@localhost:~/dyn/zip$ abuild unpack
>>> zip: Fetching ftp://ftp.info-zip.org/pub/infozip/src/zip30.zip
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
99 1257k 99 1257k 0 0 75719 0 0:00:17 0:00:17 --:--:-- 132k
curl: (18) transfer closed with 914 bytes remaining to read
>>> ERROR: zip: unpack failed
</code>
But the source archive in fact is downloaded correctly:
<code class="text">
bui@localhost:~/dyn/zip$ abuild unpack
>>> zip: Fetching ftp://ftp.info-zip.org/pub/infozip/src/zip30.zip
>>> zip: Checking sha512sums...
zip30.zip: OK
10-zip-3.0-build.patch: OK
20-zip-3.0-exec-stack.patch: OK
30-zip-3.0-pic.patch: OK
>>> zip: Unpacking /var/cache/distfiles/zip30.zip...
bui@localhost:~/dyn/zip$ abuild prepare
>>> zip: 10-zip-3.0-build.patch
patching file unix/configure
>>> zip: 20-zip-3.0-exec-stack.patch
patching file crc_i386.S
patching file match.S
>>> zip: 30-zip-3.0-pic.patch
patching file unix/configure
</code>
*(from redmine: issue id 8722, created on 2018-03-24)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8721[3.4] kamailio: A Buffer Overflow (CVE-2018-8828)2019-07-23T11:33:24ZAlicha CH[3.4] kamailio: A Buffer Overflow (CVE-2018-8828)A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow i...A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow in the tmx\_check\_pretran function in
modules/tmx/tmx\_pretran.c.
### References:
https://github.com/EnableSecurity/advisories/tree/master/ES2018-05-kamailio-heap-overflow
https://nvd.nist.gov/vuln/detail/CVE-2018-8828
### Patch:
https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097
*(from redmine: issue id 8721, created on 2018-03-23, closed on 2018-03-23)*
* Relations:
* copied_to #8718
* parent #8718
* Changesets:
* Revision 52be90970370694608bf54d75873154b5fb7da43 on 2018-03-23T13:20:05Z:
```
main/kamailio: add secinfo
Fixes #8721
```3.4.7Nathan AngelacosNathan Angelacoshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8720[3.5] kamailio: A Buffer Overflow (CVE-2018-8828)2019-07-23T11:33:25ZAlicha CH[3.5] kamailio: A Buffer Overflow (CVE-2018-8828)A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow i...A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow in the tmx\_check\_pretran function in
modules/tmx/tmx\_pretran.c.
### References:
https://github.com/EnableSecurity/advisories/tree/master/ES2018-05-kamailio-heap-overflow
https://nvd.nist.gov/vuln/detail/CVE-2018-8828
### Patch:
https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097
*(from redmine: issue id 8720, created on 2018-03-23, closed on 2018-03-23)*
* Relations:
* copied_to #8718
* parent #8718
* Changesets:
* Revision 611011ce4ca6a1c672910e6428389f76bb7e3ab2 on 2018-03-23T13:17:36Z:
```
main/kamailio: add secinfo
Fixes #8720
```3.5.3Nathan AngelacosNathan Angelacoshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8719[3.6] kamailio: A Buffer Overflow (CVE-2018-8828)2019-07-23T11:33:26ZAlicha CH[3.6] kamailio: A Buffer Overflow (CVE-2018-8828)A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow i...A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow in the tmx\_check\_pretran function in
modules/tmx/tmx\_pretran.c.
### References:
https://github.com/EnableSecurity/advisories/tree/master/ES2018-05-kamailio-heap-overflow
https://nvd.nist.gov/vuln/detail/CVE-2018-8828
### Patch:
https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097
*(from redmine: issue id 8719, created on 2018-03-23, closed on 2018-03-23)*
* Relations:
* copied_to #8718
* parent #8718
* Changesets:
* Revision eb8848bc4d4c2ab237db05aa8a5f4c9ad5af1902 on 2018-03-23T13:15:46Z:
```
main/kamailio: add secinfo
Fixes #8719
```3.6.3Nathan AngelacosNathan Angelacoshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8718kamailio: A Buffer Overflow (CVE-2018-8828)2019-07-23T11:33:27ZAlicha CHkamailio: A Buffer Overflow (CVE-2018-8828)A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow i...A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x
before 5.0.6, and 5.1.x before 5.1.2.
A specially crafted REGISTER message with a malformed branch or From tag
triggers an off-by-one
heap-based buffer overflow in the tmx\_check\_pretran function in
modules/tmx/tmx\_pretran.c.
### References:
https://github.com/EnableSecurity/advisories/tree/master/ES2018-05-kamailio-heap-overflow
https://nvd.nist.gov/vuln/detail/CVE-2018-8828
### Patch:
https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097
*(from redmine: issue id 8718, created on 2018-03-23, closed on 2018-03-23)*
* Relations:
* copied_to #8719
* copied_to #8720
* copied_to #8721
* child #8719
* child #8720
* child #8721Nathan AngelacosNathan Angelacoshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8717enable 48-bit virtual addresses for aarch642019-07-23T11:33:27ZCarlo Landmeterenable 48-bit virtual addresses for aarch64On arm64 systems with lots of ram (more then 64G) we need to set
CONFIG\_ARM64\_VA\_BITS\_48 to prevent:
[ 0.000000] initrd not fully accessible via the linear mapping -- please check your bootloader ...
Details can be found in:...On arm64 systems with lots of ram (more then 64G) we need to set
CONFIG\_ARM64\_VA\_BITS\_48 to prevent:
[ 0.000000] initrd not fully accessible via the linear mapping -- please check your bootloader ...
Details can be found in:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834505
*(from redmine: issue id 8717, created on 2018-03-23, closed on 2019-05-03)*
* Changesets:
* Revision b318282db3e297266010f85824a17c0783bbe376 by Natanael Copa on 2018-03-26T12:12:10Z:
```
main/linux-vanilla: update aarch64 config
- enable thunder2
- set ARM64_VA_BITS to 48
- increase NR_CPUS to 256
fixes #8717
```3.7.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8716[3.7] icinga2: Multiple vulnerabilities (CVE-2018-6532, CVE-2018-6534, CVE-20...2019-07-23T11:33:29ZAlicha CH[3.7] icinga2: Multiple vulnerabilities (CVE-2018-6532, CVE-2018-6534, CVE-2018-6535)**CVE-2018-6532**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted (authenticated and unauthenticated)
requests, an attacker can exhaust a lot of memory on the server side,
triggering the OOM killer.
...**CVE-2018-6532**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted (authenticated and unauthenticated)
requests, an attacker can exhaust a lot of memory on the server side,
triggering the OOM killer.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/6103
https://nvd.nist.gov/vuln/detail/CVE-2018-6532
**CVE-2018-6534**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted messages,
an attacker can cause a NULL pointer dereference, which can cause the
product to crash.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/6104
https://nvd.nist.gov/vuln/detail/CVE-2018-6534
**CVE-2018-6535**: An issue was discovered in Icinga 2.x through 2.8.1.
The lack of a constant-time
password comparison function can disclose the password to an attacker.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/5715
https://nvd.nist.gov/vuln/detail/CVE-2018-6535
*(from redmine: issue id 8716, created on 2018-03-23, closed on 2018-03-29)*
* Relations:
* copied_to #8714
* parent #8714
* Changesets:
* Revision 4cd48f4cdb74772614097f4b29bbc049847f1907 by Natanael Copa on 2018-03-27T12:48:19Z:
```
community/icinga2: security upgrade to 2.8.2 (CVE-2018-6532,CVE-2018-6534,CVE-2018-6535)
fixes #8716
```3.7.1Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8715[3.8] icinga2: Multiple vulnerabilities (CVE-2018-6532, CVE-2018-6534, CVE-20...2019-07-23T11:33:30ZAlicha CH[3.8] icinga2: Multiple vulnerabilities (CVE-2018-6532, CVE-2018-6534, CVE-2018-6535)**CVE-2018-6532**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted (authenticated and unauthenticated)
requests, an attacker can exhaust a lot of memory on the server side,
triggering the OOM killer.
...**CVE-2018-6532**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted (authenticated and unauthenticated)
requests, an attacker can exhaust a lot of memory on the server side,
triggering the OOM killer.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/6103
https://nvd.nist.gov/vuln/detail/CVE-2018-6532
**CVE-2018-6534**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted messages,
an attacker can cause a NULL pointer dereference, which can cause the
product to crash.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/6104
https://nvd.nist.gov/vuln/detail/CVE-2018-6534
**CVE-2018-6535**: An issue was discovered in Icinga 2.x through 2.8.1.
The lack of a constant-time
password comparison function can disclose the password to an attacker.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/5715
https://nvd.nist.gov/vuln/detail/CVE-2018-6535
*(from redmine: issue id 8715, created on 2018-03-23, closed on 2018-03-29)*
* Relations:
* parent #8714
* Changesets:
* Revision 11935d5b74fe70d27adb6173dbfee3441d8b9172 by Natanael Copa on 2018-03-26T08:55:19Z:
```
community/icinga2: security upgrade to 2.8.2 (CVE-2018-6532,CVE-2018-6534,CVE-2018-6535)
fixes #8715
```3.8.0Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8714icinga2: Multiple vulnerabilities (CVE-2018-6532, CVE-2018-6534, CVE-2018-6535)2019-07-23T11:33:30ZAlicha CHicinga2: Multiple vulnerabilities (CVE-2018-6532, CVE-2018-6534, CVE-2018-6535)**CVE-2018-6532**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted (authenticated and unauthenticated)
requests, an attacker can exhaust a lot of memory on the server side,
triggering the OOM killer.
...**CVE-2018-6532**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted (authenticated and unauthenticated)
requests, an attacker can exhaust a lot of memory on the server side,
triggering the OOM killer.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/6103
https://nvd.nist.gov/vuln/detail/CVE-2018-6532
**CVE-2018-6534**: An issue was discovered in Icinga 2.x through 2.8.1.
By sending specially crafted messages,
an attacker can cause a NULL pointer dereference, which can cause the
product to crash.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/6104
https://nvd.nist.gov/vuln/detail/CVE-2018-6534
**CVE-2018-6535**: An issue was discovered in Icinga 2.x through 2.8.1.
The lack of a constant-time
password comparison function can disclose the password to an attacker.
### Fixed in Version:
Icinga 2.8.2.
### References:
http://openwall.com/lists/oss-security/2018/03/22/3
https://github.com/Icinga/icinga2/pull/5715
https://nvd.nist.gov/vuln/detail/CVE-2018-6535
*(from redmine: issue id 8714, created on 2018-03-23, closed on 2018-03-29)*
* Relations:
* copied_to #8716
* child #8715
* child #8716Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8713Abuild-tar strips necessary data on aarch64 (qemu) in some cases2019-07-23T11:33:32ZalgitbotAbuild-tar strips necessary data on aarch64 (qemu) in some casesI tried to port package using arm64v8/alpine Docker image and
aarch64-static with binfmt configured.
Overall build process was fine except from created .apk file for main
package who had 6
KiB size and only one broken symlink inside (...I tried to port package using arm64v8/alpine Docker image and
aarch64-static with binfmt configured.
Overall build process was fine except from created .apk file for main
package who had 6
KiB size and only one broken symlink inside (**-dev,**-libs are OK).
Investigated it a bit and apparently `abuild-tar` is the problem here,
tarring main package yields 27.5 MiB file and passing it through
`abuild-tar --hash` reduces it to 6 KiB (again it works fine for \*-dev
and
\*-libs).
Passing the same input to `abuild-tar --hash` on x86\_64 and armhf image
gives correct result
Because of the size I’m putting affected example here:
https://github.com/mati865/abuild-tar-bug
*(from redmine: issue id 8713, created on 2018-03-23, closed on 2019-02-25)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8712rt4 package built incorrectly2019-07-23T11:33:33Zalgitbotrt4 package built incorrectlyThe patch file
0001-email-allow-envelope-from-overriding-from-templates.patch applies
successfully, but results in RT being unable to function.
The root cause is that the $envelope\_from variable is created in one
function and reference...The patch file
0001-email-allow-envelope-from-overriding-from-templates.patch applies
successfully, but results in RT being unable to function.
The root cause is that the $envelope\_from variable is created in one
function and referenced in another. Somewhere between 4.2 and 4.4, RT
split the original function (SendEmail) into two functions, causing the
reference to be out of scope.
I’ve checked a few other distributions (ubuntu, debian, arch) and none
of them seem to have a similar patch, so it might be safe to just remove
it altogether.
To replicate:
$ docker run --rm -it alpine:3.7 sh -c "apk add --no-cache rt4 && rt-server"
Error message:
--snip--
[19] [Thu Mar 22 14:47:40 2018] [critical]: Global symbol "$envelope_from" requires explicit package name (did you forget to declare "my $envelope_from"?) at /usr/lib/rt4/RT/Interface/Email.pm line 758.
Type of arg 1 to RT::Util::safe_run_child must be block or sub {} (not reference constructor) at /usr/lib/rt4/RT/Interface/Email.pm line 1529, near "};"
--snip--
*(from redmine: issue id 8712, created on 2018-03-22, closed on 2019-05-03)*
* Changesets:
* Revision 8a968286ba9850a24c8244137f5bdca3f78cd893 by Kory Prince on 2018-03-26T07:26:06Z:
```
community/rt4: fix email patch for v4.4.2
Fixes #8712
```
* Revision f210d0d2cbfaa48511d81cb49a904c30de877e1b by Kory Prince on 2018-03-26T11:57:28Z:
```
community/rt4: fix email patch for v4.4.2
Fixes #8712
```
* Revision 9f80be0770ff7f3e644916d66abc1175d0265349 by Kory Prince on 2018-04-02T14:19:27Z:
```
community/rt4: quiet chomp warnings
Fixes #8712 #8738
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/8711mongodb 3.6.3-r0 fails because of wrong dependencies2019-07-23T11:33:33Zalgitbotmongodb 3.6.3-r0 fails because of wrong dependencies<code class="text">
# apk --no-cache add mongodb
fetch http://dl-cdn.alpinelinux.org/alpine/edge/main/x86_64/APKINDEX.tar.gz
fetch http://dl-cdn.alpinelinux.org/alpine/edge/community/x86_64/APKINDEX.tar.gz
ERROR: unsatisf...<code class="text">
# apk --no-cache add mongodb
fetch http://dl-cdn.alpinelinux.org/alpine/edge/main/x86_64/APKINDEX.tar.gz
fetch http://dl-cdn.alpinelinux.org/alpine/edge/community/x86_64/APKINDEX.tar.gz
ERROR: unsatisfiable constraints:
so:libyaml-cpp.so.0.5 (missing):
required by: mongodb-3.6.3-r0[so:libyaml-cpp.so.0.5] mongodb-3.6.3-r0[so:libyaml-cpp.so.0.5]
mongodb-3.6.3-r0[so:libyaml-cpp.so.0.5] mongodb-3.6.3-r0[so:libyaml-cpp.so.0.5]
mongodb-3.6.3-r0[so:libyaml-cpp.so.0.5] mongodb-3.6.3-r0[so:libyaml-cpp.so.0.5]
</code>
the newest version of libyaml-cpp available is
https://pkgs.alpinelinux.org/package/edge/community/x86\_64/yaml-cpp
0.6.2-r0
In my understanding just a rebuild of the package should solve this.
Thanks!
*(from redmine: issue id 8711, created on 2018-03-22, closed on 2019-05-03)*
* Changesets:
* Revision 0a97ca1dd931ba7fea161fb8d8debb64338afa46 by Natanael Copa on 2018-03-27T15:12:03Z:
```
community/mongodb: rebuild against yaml-cpp
fixes #8711
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/8710[3.4] tiff: uncontrolled resource consumption in TIFFSetDirectory function in...2019-07-23T11:33:34ZAlicha CH[3.4] tiff: uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c (CVE-2018-5784)In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif\_dir.c. Remote attackers could
leverage
this vulnerability to cause a denial of service via a crafted tif file.
This occurs because...In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif\_dir.c. Remote attackers could
leverage
this vulnerability to cause a denial of service via a crafted tif file.
This occurs because the declared number of directory entries is not
validated against the actual number of directory entries.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2772
https://nvd.nist.gov/vuln/detail/CVE-2018-5784
### Patch:
https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef
*(from redmine: issue id 8710, created on 2018-03-22, closed on 2018-04-03)*
* Relations:
* copied_to #8705
* parent #8705
* Changesets:
* Revision e132e3f9bf008c2ec054305050040eb7d6958633 on 2018-04-02T17:36:52Z:
```
main/tiff: fix CVE-2018-5784
fixes #8710
```3.4.7https://gitlab.alpinelinux.org/alpine/aports/-/issues/8709[3.5] tiff: uncontrolled resource consumption in TIFFSetDirectory function in...2019-07-23T11:33:35ZAlicha CH[3.5] tiff: uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c (CVE-2018-5784)In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif\_dir.c. Remote attackers could
leverage
this vulnerability to cause a denial of service via a crafted tif file.
This occurs because...In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif\_dir.c. Remote attackers could
leverage
this vulnerability to cause a denial of service via a crafted tif file.
This occurs because the declared number of directory entries is not
validated against the actual number of directory entries.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2772
https://nvd.nist.gov/vuln/detail/CVE-2018-5784
### Patch:
https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef
*(from redmine: issue id 8709, created on 2018-03-22, closed on 2018-04-03)*
* Relations:
* copied_to #8705
* parent #8705
* Changesets:
* Revision 39e7a41708bf7726f95f47c383c9af376504e3f7 on 2018-04-02T17:36:16Z:
```
main/tiff: fix CVE-2018-5784
fixes #8709
```3.5.3https://gitlab.alpinelinux.org/alpine/aports/-/issues/8708[3.6] tiff: uncontrolled resource consumption in TIFFSetDirectory function in...2019-07-23T11:33:36ZAlicha CH[3.6] tiff: uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c (CVE-2018-5784)In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif\_dir.c. Remote attackers could
leverage
this vulnerability to cause a denial of service via a crafted tif file.
This occurs because...In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif\_dir.c. Remote attackers could
leverage
this vulnerability to cause a denial of service via a crafted tif file.
This occurs because the declared number of directory entries is not
validated against the actual number of directory entries.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2772
https://nvd.nist.gov/vuln/detail/CVE-2018-5784
### Patch:
https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef
*(from redmine: issue id 8708, created on 2018-03-22, closed on 2018-04-03)*
* Relations:
* copied_to #8705
* parent #87053.6.3