aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2023-09-12T10:39:03Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8759Aporting clisp 2.49 on arm failed with '[Makefile:1732: interpreted.mem] Segm...2023-09-12T10:39:03ZGiovanni MinnitiAporting clisp 2.49 on arm failed with '[Makefile:1732: interpreted.mem] Segmentation fault'Trying to port clisp to armhf architecture, had no success:
My goal is to aport SBCL to armhf, need clisp as a pre-requisite.
\- seen some errors in ariarm:
ariarm.s: Assembler messages:
ariarm.s:1: Warning: ignoring attempt t...Trying to port clisp to armhf architecture, had no success:
My goal is to aport SBCL to armhf, need clisp as a pre-requisite.
\- seen some errors in ariarm:
ariarm.s: Assembler messages:
ariarm.s:1: Warning: ignoring attempt to redefine built-in register 'a1'
ariarm.s:2: Warning: ignoring attempt to redefine built-in register 'a2'
ariarm.s:3: Warning: ignoring attempt to redefine built-in register 'a3'
ariarm.s:4: Warning: ignoring attempt to redefine built-in register 'a4'
ariarm.s:5: Warning: ignoring attempt to redefine built-in register 'v1'
ariarm.s:6: Warning: ignoring attempt to redefine built-in register 'v2'
ariarm.s:7: Warning: ignoring attempt to redefine built-in register 'v3'
ariarm.s:8: Warning: ignoring attempt to redefine built-in register 'v4'
ariarm.s:9: Warning: ignoring attempt to redefine built-in register 'v5'
ariarm.s:10: Warning: ignoring attempt to redefine built-in register 'v6'
ariarm.s:12: Warning: ignoring attempt to redefine built-in register 'sl'
ariarm.s:13: Warning: ignoring attempt to redefine built-in register 'fp'
ariarm.s:14: Warning: ignoring attempt to redefine built-in register 'ip'
ariarm.s:15: Warning: ignoring attempt to redefine built-in register 'sp'
ariarm.s:16: Warning: ignoring attempt to redefine built-in register 'lr'
ariarm.s:17: Warning: ignoring attempt to redefine built-in register 'pc'
ariarm.s:152: s suffix on comparison instruction is deprecated
ariarm.s:1027: s suffix on comparison instruction is deprecated
ariarm.s:1032: s suffix on comparison instruction is deprecated
\- ended with:
./lisp.run -B . -E UTF-8 -Epathname 1:1 -Emisc 1:1 -norc -m 2MW -lp /home/builder/package/clisp/src/clisp-2.49/src/ -x '(and (load "/home/builder/package/clisp/src/clisp-2.49/src/init.lisp") (sys::%saveinitmem) (ext::exit)) (ext::exit t)'
make: *** [Makefile:1732: interpreted.mem] Segmentation fault
Who can help me on that?
*(from redmine: issue id 8759, created on 2018-04-03)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8757mcabber: no colors with musl build2019-07-23T11:33:01ZMilan P. Stanićmcabber: no colors with musl buildmcabber don’t colorize anything when compiled with musl library.
I found old patch which fixed this, built mcabber with this patch
applied and now there are colors
Is is discused here:
https://bitbucket.org/McKael/mcabber-crew/issu...mcabber don’t colorize anything when compiled with musl library.
I found old patch which fixed this, built mcabber with this patch
applied and now there are colors
Is is discused here:
https://bitbucket.org/McKael/mcabber-crew/issues/60/no-roster-colors-on-freebsd-81
with patch attached to the first message.
I’m attaching this patch here, slightly edited at top
*(from redmine: issue id 8757, created on 2018-04-01, closed on 2019-03-16)*
* Changesets:
* Revision e7c1fe60a65bf1738161ff27109f56941c1adced on 2018-11-11T22:21:49Z:
```
main/mcabber: fix colors
Fixes #8757
```
* Uploads:
* [fix-roster-colors-on-freebsd.patch](/uploads/9007bfb81581f63e3708ec34c8d3725d/fix-roster-colors-on-freebsd.patch)Fabian AffolterFabian Affolterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8756Package request: Firefox 59.0.22019-07-23T11:33:02ZalgitbotPackage request: Firefox 59.0.2Multiple security issues have been fixed since Firefox 58.0.1, which is
the latest version available from Alpine testing repository.
*(from redmine: issue id 8756, created on 2018-04-01, closed on 2019-06-19)*Multiple security issues have been fixed since Firefox 58.0.1, which is
the latest version available from Alpine testing repository.
*(from redmine: issue id 8756, created on 2018-04-01, closed on 2019-06-19)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8754netcat-openbsd: listener doesn't work (Bug #8745)2019-07-15T00:27:13Zalgitbotnetcat-openbsd: listener doesn't work (Bug #8745)BTW. My login is kaztost, but I am still waiting a confirmation e-mail
(to gmail.com) to complete registration (and I can not proceed a
discussion in \#8745).
I also have the same bug with netcat-openbsd on armhf device (kernel
3.1.10)....BTW. My login is kaztost, but I am still waiting a confirmation e-mail
(to gmail.com) to complete registration (and I can not proceed a
discussion in \#8745).
I also have the same bug with netcat-openbsd on armhf device (kernel
3.1.10). In my case strace returns
<code class="text">
setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [1], 4) = -1 ENOPROTOOPT (Protocol not available)
</code>
So this is a issue from
https://serverfault.com/questions/725231/netcat-not-able-to-bind-a-listening-socket.
To support old kernels it is neccessary to recompile netcat-openbsd with
\#undef SO\_REUSEPORT
*(from redmine: issue id 8754, created on 2018-03-31)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8753Package request: Myrddin Compiler2020-01-20T16:14:06ZalgitbotPackage request: Myrddin CompilerMyrddin is a systems language that is both powerful and fun to use. It
aims for C like low level control, a lightweight high quality
implementation, and features you may find familiar from languages like
like rust and ocaml.
This combin...Myrddin is a systems language that is both powerful and fun to use. It
aims for C like low level control, a lightweight high quality
implementation, and features you may find familiar from languages like
like rust and ocaml.
This combination makes Myrddin suitable for anything ranging from
desktop applications, to embedded systems and potentially even kernel
development.
https://github.com/oridb/mc
*(from redmine: issue id 8753, created on 2018-03-30)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8750[3.4] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple Vulnerabilitie2019-07-23T11:33:04ZNatanael Copa[3.4] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple VulnerabilitieRuby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and ...Ruby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and directory creation with
directory traversal in tempfile and
tmpdir](https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/)
- [CVE-2018-8777: DoS by large request in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/)
- [CVE-2018-8778: Buffer under-read in
String\#unpack](https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/)
- [CVE-2018-8779: Unintentional socket creation by poisoned NUL byte
in UNIXServer and
UNIXSocket](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/)
- [CVE-2018-8780: Unintentional directory traversal by poisoned NUL
byte in
Dir](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/)
- [Multiple vulnerabilities in
RubyGems](https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/)
Fixed in ruby 2.5.1, 2.4.4, 2.3.7, 2.2.10
*(from redmine: issue id 8750, created on 2018-03-29, closed on 2018-04-03)*
* Relations:
* parent #8746
* Changesets:
* Revision 1779cab830661bf6686eb27c5b5c3117f8b91cee by Natanael Copa on 2018-03-29T14:32:44Z:
```
main/ruby: security upgrade to 2.3.7
CVE-2017-17742: HTTP response splitting in WEBrick
CVE-2018-6914: Unintentional file and directory creation with directory
traversal in tempfile and tmpdir
CVE-2018-8777: DoS by large request in WEBrick
CVE-2018-8778: Buffer under-read in String#unpack
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
Dir
fixes #8750
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8749[3.5] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple Vulnerabilities2019-07-23T11:33:05ZNatanael Copa[3.5] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple VulnerabilitiesRuby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and ...Ruby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and directory creation with
directory traversal in tempfile and
tmpdir](https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/)
- [CVE-2018-8777: DoS by large request in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/)
- [CVE-2018-8778: Buffer under-read in
String\#unpack](https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/)
- [CVE-2018-8779: Unintentional socket creation by poisoned NUL byte
in UNIXServer and
UNIXSocket](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/)
- [CVE-2018-8780: Unintentional directory traversal by poisoned NUL
byte in
Dir](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/)
- [Multiple vulnerabilities in
RubyGems](https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/)
Fixed in ruby 2.5.1, 2.4.4, 2.3.7, 2.2.10
*(from redmine: issue id 8749, created on 2018-03-29, closed on 2018-04-03)*
* Relations:
* parent #8746
* Changesets:
* Revision a491b96c266e9165971fad3460ad3c8371fa5f3d by Natanael Copa on 2018-03-29T14:29:32Z:
```
main/ruby: security upgrade to 2.3.7
CVE-2017-17742: HTTP response splitting in WEBrick
CVE-2018-6914: Unintentional file and directory creation with directory
traversal in tempfile and tmpdir
CVE-2018-8777: DoS by large request in WEBrick
CVE-2018-8778: Buffer under-read in String#unpack
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
Dir
fixes #8749
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8748[3.6] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple Vulnerabilities2019-07-23T11:33:06ZNatanael Copa[3.6] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple VulnerabilitiesRuby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and ...Ruby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and directory creation with
directory traversal in tempfile and
tmpdir](https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/)
- [CVE-2018-8777: DoS by large request in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/)
- [CVE-2018-8778: Buffer under-read in
String\#unpack](https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/)
- [CVE-2018-8779: Unintentional socket creation by poisoned NUL byte
in UNIXServer and
UNIXSocket](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/)
- [CVE-2018-8780: Unintentional directory traversal by poisoned NUL
byte in
Dir](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/)
- [Multiple vulnerabilities in
RubyGems](https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/)
Fixed in ruby 2.5.1, 2.4.4, 2.3.7, 2.2.10
*(from redmine: issue id 8748, created on 2018-03-29, closed on 2018-04-03)*
* Relations:
* parent #8746
* Changesets:
* Revision deab1cc6ff27d30138b035de4aa53abe01e8afaa by Natanael Copa on 2018-03-29T14:27:09Z:
```
main/ruby: security upgrade to 2.4.4
CVE-2017-17742: HTTP response splitting in WEBrick
CVE-2018-6914: Unintentional file and directory creation with directory
traversal in tempfile and tmpdir
CVE-2018-8777: DoS by large request in WEBrick
CVE-2018-8778: Buffer under-read in String#unpack
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
Dir
fixes #8748
```3.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8747[3.7] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple Vulnerabilities2019-07-23T11:33:07ZNatanael Copa[3.7] Ruby 2.2.9, 2.3.6, 2.4.3, 2.5.0 Multiple VulnerabilitiesRuby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and ...Ruby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and directory creation with
directory traversal in tempfile and
tmpdir](https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/)
- [CVE-2018-8777: DoS by large request in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/)
- [CVE-2018-8778: Buffer under-read in
String\#unpack](https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/)
- [CVE-2018-8779: Unintentional socket creation by poisoned NUL byte
in UNIXServer and
UNIXSocket](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/)
- [CVE-2018-8780: Unintentional directory traversal by poisoned NUL
byte in
Dir](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/)
- [Multiple vulnerabilities in
RubyGems](https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/)
Fixed in ruby 2.5.1, 2.4.4, 2.3.7, 2.2.10
*(from redmine: issue id 8747, created on 2018-03-29, closed on 2018-04-03)*
* Relations:
* parent #8746
* Changesets:
* Revision 8e71f2e5fdb9d522368ddca664bf4a3f68864028 by Natanael Copa on 2018-03-29T14:19:52Z:
```
main/ruby: security upgrade to 2.5.1
CVE-2017-17742: HTTP response splitting in WEBrick
CVE-2018-6914: Unintentional file and directory creation with directory
traversal in tempfile and tmpdir
CVE-2018-8777: DoS by large request in WEBrick
CVE-2018-8778: Buffer under-read in String#unpack
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
Dir
ref #8747
```
* Revision 0bba17025ab6922c000ede63361dd0220e92ed31 by Natanael Copa on 2018-03-29T14:25:15Z:
```
main/ruby: security upgrade to 2.4.4
CVE-2017-17742: HTTP response splitting in WEBrick
CVE-2018-6914: Unintentional file and directory creation with directory
traversal in tempfile and tmpdir
CVE-2018-8777: DoS by large request in WEBrick
CVE-2018-8778: Buffer under-read in String#unpack
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
Dir
fixes #8747
```3.7.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8746Ruby: Multiple Vulnerabilities (CVE-2017-17742, CVE-2018-6914, CVE-2018-8777,...2019-07-23T11:33:08ZalgitbotRuby: Multiple Vulnerabilities (CVE-2017-17742, CVE-2018-6914, CVE-2018-8777, CVE-2018-8778, CVE-2018-8779, CVE-2018-8780)Ruby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and ...Ruby has multiple vulnerabilities:
- [CVE-2017-17742: HTTP response splitting in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/)
- [CVE-2018-6914: Unintentional file and directory creation with
directory traversal in tempfile and
tmpdir](https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/)
- [CVE-2018-8777: DoS by large request in
WEBrick](https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/)
- [CVE-2018-8778: Buffer under-read in
String\#unpack](https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/)
- [CVE-2018-8779: Unintentional socket creation by poisoned NUL byte
in UNIXServer and
UNIXSocket](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/)
- [CVE-2018-8780: Unintentional directory traversal by poisoned NUL
byte in
Dir](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/)
- [Multiple vulnerabilities in
RubyGems](https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/)
Fixed In Version:
ruby 2.5.1, 2.4.4, 2.3.7, 2.2.10
*(from redmine: issue id 8746, created on 2018-03-29, closed on 2018-04-03)*
* Relations:
* child #8747
* child #8748
* child #8749
* child #87503.7.1https://gitlab.alpinelinux.org/alpine/aports/-/issues/8745netcat-openbsd: listener doesn't work2019-07-15T00:27:06ZAlif Alifnetcat-openbsd: listener doesn't workVersion: 1.130-r1
Arch: armhf
Kernel: 3.4 (postmarketos)
Running nc with -l option doesn’t work.
$ nc -l 9000 >/dev/null
nc: Protocol not available
$ echo $?
1
*(from redmine: issue id 8745, created on 2018-03-29)*Version: 1.130-r1
Arch: armhf
Kernel: 3.4 (postmarketos)
Running nc with -l option doesn’t work.
$ nc -l 9000 >/dev/null
nc: Protocol not available
$ echo $?
1
*(from redmine: issue id 8745, created on 2018-03-29)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8744RasPi Build does not include CONFIG_NF_TABLES2020-01-20T16:10:35ZalgitbotRasPi Build does not include CONFIG_NF_TABLESHi
I’m running the 3.7 RasPi Build and I can’t get nftables to run. It
appears that the kernel is missing CONFIG\_NF\_TABLES. On a normal
alpine distribution this works. I am unsure whether this is considered a
bug or if there is a reas...Hi
I’m running the 3.7 RasPi Build and I can’t get nftables to run. It
appears that the kernel is missing CONFIG\_NF\_TABLES. On a normal
alpine distribution this works. I am unsure whether this is considered a
bug or if there is a reason for excluding it.
1. uname -a
Linux torpido 4.9.65-0-rpi2 \#1-Alpine SMP PREEMPT Thu Nov 30
17:01:05 GMT 2017 armv7l Linux
<!-- -->
1. zcat /proc/config.gz | grep NF\_TABLES
2. CONFIG\_NF\_TABLES is not set
<!-- -->
1. ls /lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_\*
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_amanda.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_broadcast.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_ftp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_h323.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_irc.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_netbios\_ns.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_netlink.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_pptp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_proto\_dccp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_proto\_gre.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_proto\_sctp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_proto\_udplite.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_sane.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_sip.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_snmp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_conntrack\_tftp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_log\_common.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_amanda.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_ftp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_irc.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_proto\_dccp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_proto\_sctp.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_proto\_udplite.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_redirect.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_sip.ko
/lib/modules/4.9.65-0-rpi2/kernel/net/netfilter/nf\_nat\_tftp.ko
Thanks & best
Otto
*(from redmine: issue id 8744, created on 2018-03-28)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8743lbu: Add support for detecting file-permission changes2020-03-16T01:21:07Zalgitbotlbu: Add support for detecting file-permission changesCurrently “lbu commit” does not detect, if a file-permission has been
changed - and the file-permission is the ONLY change.
To fix this, we could use ‘stats’ to compare file-permissions.
Attached is a simple patch to use ‘stats’ to de...Currently “lbu commit” does not detect, if a file-permission has been
changed - and the file-permission is the ONLY change.
To fix this, we could use ‘stats’ to compare file-permissions.
Attached is a simple patch to use ‘stats’ to detect file-permission
changes
*(from redmine: issue id 8743, created on 2018-03-27)*
* Uploads:
* [lbu-file-permission.diff](/uploads/82e68ee0a63e37f5ec2fdd5993845868/lbu-file-permission.diff) Make LBU aware of file-permissions3.7.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8742Add mod_md sub package for new apache 2.4.332019-07-12T15:34:41ZAndy PostnikovAdd mod_md sub package for new apache 2.4.33There’s new experimental extension to deal with letsencrypt
https://httpd.apache.org/docs/2.4/mod/mod\_md.html
*(from redmine: issue id 8742, created on 2018-03-27)*There’s new experimental extension to deal with letsencrypt
https://httpd.apache.org/docs/2.4/mod/mod\_md.html
*(from redmine: issue id 8742, created on 2018-03-27)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8741xpra start doesn't read /etc/xpra/xorg.conf2023-06-30T23:34:25Zalgitbotxpra start doesn't read /etc/xpra/xorg.confI’ve installed xpra in alpine docker container, but I think this issue
also appears in a normal install.
When I use <code>xpra start —bind-tcp=0.0.0.0:10000 —daemon=no
—start-child=xclock</code>, it failed with reason:
<code class=...I’ve installed xpra in alpine docker container, but I think this issue
also appears in a normal install.
When I use <code>xpra start —bind-tcp=0.0.0.0:10000 —daemon=no
—start-child=xclock</code>, it failed with reason:
<code class="text">
/etc/xpra/conf.d # xpra start --bind-tcp=0.0.0.0:10000 --daemon=no --start-child=xclock
Warning: running as root
Failed to rename log file "/tmp/Xorg.S159.log" to "/tmp/Xorg.S159.log": No such file or directory
X.Org X Server 1.19.5
Release Date: 2017-10-12
X Protocol Version 11, Revision 0
Build Operating System: Linux 4.4.45-0-grsec x86_64 Alpine Linux
Current Operating System: Linux bb7312faa016 4.9.76-gentoo-r1 #27 SMP Sun Mar 11 14:27:21 CST 2018 x86_64
Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.9.76-gentoo-r1 root=UUID=cf0a3df4-4e99-49f0-b46c-12904e489dd5 ro domdadm
Build Date: 07 November 2017 03:08:54PM
Current version of pixman: 0.34.0
Before reporting problems, check http://wiki.x.org
to make sure that you have the latest version.
Markers: (--) probed, (**) from config file, (==) default setting,
(++) from command line, (!!) notice, (II) informational,
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
(++) Log file: "/tmp/Xorg.S159.log", Time: Tue Mar 27 10:51:31 2018
(==) Using system config directory "/usr/share/X11/xorg.conf.d"
(EE)
Fatal server error:
(EE) parse_vt_settings: Cannot open /dev/tty0 (No such file or directory)
(EE)
(EE)
Please consult the The X.Org Foundation support
at http://wiki.x.org
for help.
(EE) Please also check the log file at "/tmp/Xorg.S159.log" for additional information.
(EE)
(EE) Server terminated with error (1). Closing log file.
InitException: xpra_Xdummy did not provide a display number using -displayfd
xpra initialization error:
xpra_Xdummy did not provide a display number using -displayfd
2018-03-27 10:51:39,466 closing TCP socket 0.0.0.0:10000
</code>
Digging into /tmp/Xorg.S159.log gives me this:
<code class="text">
[ 2610.559] (EE) Unable to locate/open config file: "/home/buildozer/aports/community/xpra/pkg/xpra/etc/xpra/xorg.conf"
[ 2610.559] (EE) Unable to locate/open config directory: "/root/.xpra/xorg.conf.d"
[ 2610.559] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[ 2610.559] (==) No Layout section. Using the first Screen section.
[ 2610.559] (==) No screen section available. Using defaults.
[ 2610.559] (**) |-->Screen "Default Screen Section" (0)
[ 2610.559] (**) | |-->Monitor "<default monitor>"
</code>
It seems that it tried to read the Xorg config file from
<code>/home/buildozer/aports/community/xpra/pkg/xpra/etc/xpra/xorg.conf</code>.
So I added <code>-config /etc/xpra/xorg.conf</code> to
<code>/etc/xpra/conf.d/55\_server\_x11.conf</code> like the following
<code class="text">
/etc/xpra/conf.d # tail 55_server_x11.conf
# xvfb = /usr/bin/Xorg -noreset -nolisten tcp \
# +extension GLX +extension RANDR +extension RENDER \
# -auth $XAUTHORITY \
# -logfile auto/Xorg.${DISPLAY}.log \
# -configdir ${HOME}/.xpra/xorg.conf.d \
# -config /home/buildozer/aports/community/xpra/pkg/xpra/etc/xpra/xorg.conf
#
# Selecting virtual X server:
#xvfb = xpra_Xdummy -noreset -novtswitch -nolisten tcp +extension GLX +extension RANDR +extension RENDER -auth $XAUTHORITY -logfile ${XPRA_LOG_DIR}/Xorg.${DISPLAY}.log -configdir ${HOME}/.xpra/xorg.conf.d -config /home/buildozer/aports/community/xpra/pkg/xpra/etc/xpra/xorg.conf
xvfb = xpra_Xdummy -noreset -novtswitch -nolisten tcp +extension GLX +extension RANDR +extension RENDER -auth $XAUTHORITY -logfile ${XPRA_LOG_DIR}/Xorg.${DISPLAY}.log -configdir ${HOME}/.xpra/xorg.conf.d -config /home/buildozer/aports/community/xpra/pkg/xpra/etc/xpra/xorg.conf -config /etc/xpra/xorg.conf
</code>
and then it works.
*(from redmine: issue id 8741, created on 2018-03-27)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8740kernel spectre_v2 issues, needs to rebuild with newer compiler2020-01-19T15:04:42Zalgitbotkernel spectre_v2 issues, needs to rebuild with newer compilercat /sys/devices/system/cpu/vulnerabilities/spectre\_v2 reports
Vulnerable: Minimal generic ASM retpoline
needs gcc 7.3 or patched gcc 6.3.
*(from redmine: issue id 8740, created on 2018-03-26)*cat /sys/devices/system/cpu/vulnerabilities/spectre\_v2 reports
Vulnerable: Minimal generic ASM retpoline
needs gcc 7.3 or patched gcc 6.3.
*(from redmine: issue id 8740, created on 2018-03-26)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8739community/rt4 perl deprecated messages2019-07-15T03:42:30ZKory Princecommunity/rt4 perl deprecated messagesRequest Tracker 4.4.2 (latest release) has a bug on the search page
causing the warning “Unescaped left brace in regex is deprecated here
(and will be fatal in Perl 5.30), passed through in regex” to be output
to the log every time the p...Request Tracker 4.4.2 (latest release) has a bug on the search page
causing the warning “Unescaped left brace in regex is deprecated here
(and will be fatal in Perl 5.30), passed through in regex” to be output
to the log every time the page is loaded.
This has been fixed in upstream (971daa20c), but not released yet. I’d
like to backport this fix until the new release happens (I can’t find
any sort of ETA and the last release was July 2017.)
I’ll submit a patch shortly with this fix.
*(from redmine: issue id 8739, created on 2018-03-26)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8738community/rt4 warning messages2019-07-23T11:33:09ZKory Princecommunity/rt4 warning messagesThis is a followup to issue \#8712. The first patch caused an issue with
warnings about chomp. I submitted a second patch, but the first got
merged, leaving the warnings still there. I will resubmit a patch fixing
these errors shortly.
...This is a followup to issue \#8712. The first patch caused an issue with
warnings about chomp. I submitted a second patch, but the first got
merged, leaving the warnings still there. I will resubmit a patch fixing
these errors shortly.
*(from redmine: issue id 8738, created on 2018-03-26, closed on 2019-05-03)*
* Changesets:
* Revision 9f80be0770ff7f3e644916d66abc1175d0265349 by Kory Prince on 2018-04-02T14:19:27Z:
```
community/rt4: quiet chomp warnings
Fixes #8712 #8738
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/8737[3.4] uwsgi: Multiple vulnerabilities (CVE-2018-6758, CVE-2018-7490)2019-07-23T11:33:10ZAlicha CH[3.4] uwsgi: Multiple vulnerabilities (CVE-2018-6758, CVE-2018-7490)**CVE-2018-6758**: The uwsgi\_expand\_path function in core/utils.c in
Unbit uWSGI through 2.0.15 has a
stack-based buffer overflow via a large directory length.
### References:
http://lists.unbit.it/pipermail/uwsgi/2018-February/008...**CVE-2018-6758**: The uwsgi\_expand\_path function in core/utils.c in
Unbit uWSGI through 2.0.15 has a
stack-based buffer overflow via a large directory length.
### References:
http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6758
### Patch:
https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe
**CVE-2018-7490**: uwsgi before 2.0.17 mishandles a DOCUMENT\_ROOT check
during use
of the —php-docroot option, allowing directory traversal.
### Fixed In Version:
uwsgi 2.0.17
### References:
https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.html
https://nvd.nist.gov/vuln/detail/CVE-2018-7490
### Patch:
https://github.com/unbit/uwsgi/commit/0a480f435ea6feb63deb410ad2bf376ed3f05f8a
*(from redmine: issue id 8737, created on 2018-03-26, closed on 2018-03-29)*
* Relations:
* copied_to #8733
* parent #8733
* Changesets:
* Revision 1308713a57c313602159ec24e457dc05f4865c60 by Natanael Copa on 2018-03-27T12:45:24Z:
```
main/uwsgi: security upgrade to 2.0.17 (CVE-2018-6758,CVE-2018-7490)
fixes #8737
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8736[3.5] uwsgi: Multiple vulnerabilities (CVE-2018-6758, CVE-2018-7490)2019-07-23T11:33:11ZAlicha CH[3.5] uwsgi: Multiple vulnerabilities (CVE-2018-6758, CVE-2018-7490)**CVE-2018-6758**: The uwsgi\_expand\_path function in core/utils.c in
Unbit uWSGI through 2.0.15 has a
stack-based buffer overflow via a large directory length.
### References:
http://lists.unbit.it/pipermail/uwsgi/2018-February/008...**CVE-2018-6758**: The uwsgi\_expand\_path function in core/utils.c in
Unbit uWSGI through 2.0.15 has a
stack-based buffer overflow via a large directory length.
### References:
http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6758
### Patch:
https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe
**CVE-2018-7490**: uwsgi before 2.0.17 mishandles a DOCUMENT\_ROOT check
during use
of the —php-docroot option, allowing directory traversal.
### Fixed In Version:
uwsgi 2.0.17
### References:
https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.html
https://nvd.nist.gov/vuln/detail/CVE-2018-7490
### Patch:
https://github.com/unbit/uwsgi/commit/0a480f435ea6feb63deb410ad2bf376ed3f05f8a
*(from redmine: issue id 8736, created on 2018-03-26, closed on 2018-03-29)*
* Relations:
* copied_to #8733
* parent #8733
* Changesets:
* Revision 70b37ac2d8579e4bb8c86a3e95945788262b9e5d by Natanael Copa on 2018-03-27T12:44:40Z:
```
main/uwsgi: security upgrade to 2.0.17 (CVE-2018-6758,CVE-2018-7490)
fixes #8736
```3.5.3Natanael CopaNatanael Copa