aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2020-05-05T17:02:56Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/11443busybox-doc package is empty2020-05-05T17:02:56Zedwargixbusybox-doc package is emptyHello,
The man page in the busybox-doc package seems to be empty. This was also posted here: https://lists.alpinelinux.org/~alpine/devel/%3C875zdo3xeo.fsf%40florness.com%3E
```
$ apk info -L busybox-doc
busybox-doc-1.31.1-r14 contains...Hello,
The man page in the busybox-doc package seems to be empty. This was also posted here: https://lists.alpinelinux.org/~alpine/devel/%3C875zdo3xeo.fsf%40florness.com%3E
```
$ apk info -L busybox-doc
busybox-doc-1.31.1-r14 contains:
usr/share/man/man1/busybox.1.gz
$ zcat /usr/share/man/man1/busybox.1.gz
$
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/10673swaybar crashes after you hover the mouse pointer over it2019-12-05T07:43:23ZMatthew Johnsonswaybar crashes after you hover the mouse pointer over itTo reproduce the issue:
`$ swaybar --bar_id=bar-0`
`2019-07-11 14:00:00 - [swaybar/tray/tray.c:42] Failed to connect to user bus: No such file or directory`
(At this moment the bar works fine)
After I hover the mouse over it, the...To reproduce the issue:
`$ swaybar --bar_id=bar-0`
`2019-07-11 14:00:00 - [swaybar/tray/tray.c:42] Failed to connect to user bus: No such file or directory`
(At this moment the bar works fine)
After I hover the mouse over it, the bar disappears and the following
appears on the shell:
`Segmentation fault`
*(from redmine: issue id 10673, created on 2019-07-11)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/10672Cannot install php7 libraries2019-07-23T11:06:05ZAario ShahbanyCannot install php7 librariesJust same as:
https://bugs.alpinelinux.org/issues/8780
When installing php7 libraries from Alpine 3.10 repositories, you get
errors like:
<code class="c">
PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib/p...Just same as:
https://bugs.alpinelinux.org/issues/8780
When installing php7 libraries from Alpine 3.10 repositories, you get
errors like:
<code class="c">
PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib/php7/modules/pdo_mysql.so' - Error relocating /usr/lib/php7/modules/pdo_mysql.so: mysqlnd_allocator: symbol not found in Unknown on line 0
</code>
As a result, php7.2 alpine docker images are now useless:
https://github.com/docker-library/php/blob/66234ccc01849f2ce1a6b18428d4a7215921d647/7.2/alpine3.10/fpm/Dockerfile
This is why I see it as high priority.
*(from redmine: issue id 10672, created on 2019-07-11, closed on 2019-07-11)*3.10.1https://gitlab.alpinelinux.org/alpine/aports/-/issues/10671irqbalance: missing creation of directory (irqbalance) in /var/run/2019-07-23T10:35:39ZMY-Rirqbalance: missing creation of directory (irqbalance) in /var/run/After commit: main/irqbalance: upgrade to 1.6.0
Alpine log showing warning:
<code>
daemon.warn /usr/sbin/irqbalance: Daemon couldn’t be bound to the
file-based socket.
</code>
Probably related to this change:
https://github.com/I...After commit: main/irqbalance: upgrade to 1.6.0
Alpine log showing warning:
<code>
daemon.warn /usr/sbin/irqbalance: Daemon couldn’t be bound to the
file-based socket.
</code>
Probably related to this change:
https://github.com/Irqbalance/irqbalance/commit/19c25ddc5a13cf0b993cdb0edac0eee80143be34
With created dir “irqbalance” warning is gone and file based socket is
created:
<code>
srwxr-xr-x 1 root root 0 Jul 9 18:57
/var/run/irqbalance/irqbalance3785.sock
</code>
*(from redmine: issue id 10671, created on 2019-07-09)*Henrik RiomarHenrik Riomarhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10670targetcli not installable on edge2019-07-15T14:01:50ZMax Ehrlichtargetcli not installable on edgeTrying to install targetcli on the alpine:edge docker container gives:
fetch http://dl-cdn.alpinelinux.org/alpine/edge/main/x86_64/APKINDEX.tar.gz
fetch http://dl-cdn.alpinelinux.org/alpine/edge/community/x86_64/APKINDEX.tar.gz
...Trying to install targetcli on the alpine:edge docker container gives:
fetch http://dl-cdn.alpinelinux.org/alpine/edge/main/x86_64/APKINDEX.tar.gz
fetch http://dl-cdn.alpinelinux.org/alpine/edge/community/x86_64/APKINDEX.tar.gz
ERROR: unsatisfiable constraints:
py-configshell (missing):
required by: targetcli-2.1_p49-r0[py-configshell]
py-rtslib (missing):
required by: targetcli-2.1_p49-r0[py-rtslib]
py-simpleparse (missing):
required by: targetcli-2.1_p49-r0[py-simpleparse]
When I search this package in the alpine package database
(https://pkgs.alpinelinux.org/package/edge/community/x86/targetcli) I
don’t see the missing packages listed as dependencies. Is something out
of date?
*(from redmine: issue id 10670, created on 2019-07-09)*
* Changesets:
* Revision 285edcd1308d2895ae7cdcc927a39741d3d4f28b by Francesco Colista on 2019-07-10T09:03:35Z:
```
community/targetcli: bump pkgrel. Fixes #10670
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/10669[3.7] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13...2019-07-16T11:19:32ZAlicha CH[3.7] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue...The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue id 10669, created on 2019-07-09)*
* Relations:
* parent #10664
* Changesets:
* Revision 0a4f1520352ff66f50aebb2110bea65b3ee17f90 by Natanael Copa on 2019-07-11T17:08:10Z:
```
main/squid: fix CVE-2019-13345
fixes #10669
```3.7.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10668[3.8] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13...2019-07-16T11:20:06ZAlicha CH[3.8] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue...The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue id 10668, created on 2019-07-09)*
* Relations:
* parent #10664
* Changesets:
* Revision 61747ef7247b4805f9881eedd113c538e156376d by Natanael Copa on 2019-07-11T17:01:07Z:
```
main/squid: fix CVE-2019-13345
fixes #10668
```3.8.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10667[3.9] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13...2019-07-16T11:20:38ZAlicha CH[3.9] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue...The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue id 10667, created on 2019-07-09)*
* Relations:
* parent #10664
* Changesets:
* Revision 48e59c02864ce11fac3e2ff3529f2e1f5d1b7f1e by Natanael Copa on 2019-07-11T16:42:03Z:
```
main/squid: upgrade to 4.8 (CVE-2019-13345)
fixes #10667
```3.9.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10666[3.10] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-1...2019-07-16T11:21:06ZAlicha CH[3.10] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue...The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue id 10666, created on 2019-07-09)*
* Relations:
* parent #10664
* Changesets:
* Revision a93510d1c69bc8f6e6fd0e2781ffcad140585f08 by Natanael Copa on 2019-07-11T16:36:30Z:
```
main/squid: upgrade to 4.8 (CVE-2019-13345)
fixes #10666
```3.10.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10665[3.11] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-1...2019-07-16T11:21:56ZAlicha CH[3.11] squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue...The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue id 10665, created on 2019-07-09)*
* Relations:
* parent #10664
* Changesets:
* Revision 1bd365a6732f045db6dd96f516dec5764f0c8c57 by Natanael Copa on 2019-07-11T16:35:18Z:
```
main/squid: upgrade to 4.8
fixes #10665
```3.11.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10664squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)2019-07-23T10:35:45ZAlicha CHsquid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue...The cachemgr.cgi web module of Squid through 4.7 has
XSS via the user\_name or auth parameter.
### References:
https://bugs.squid-cache.org/show\_bug.cgi?id=4957
https://github.com/squid-cache/squid/pull/429
*(from redmine: issue id 10664, created on 2019-07-09)*
* Relations:
* child #10665
* child #10666
* child #10667
* child #10668
* child #10669Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10662keyutils-dev creates symlink to /lib/libkeyutils.so.12020-04-01T13:01:00ZAnthony Davieskeyutils-dev creates symlink to /lib/libkeyutils.so.1This breaks cross compiling from a sysroot.
Link needs to be to ../../lib/libkeyutils.so.1
*(from redmine: issue id 10662, created on 2019-07-08)*
### Affected branches
- [x] master
- [x] 3.10-stableThis breaks cross compiling from a sysroot.
Link needs to be to ../../lib/libkeyutils.so.1
*(from redmine: issue id 10662, created on 2019-07-08)*
### Affected branches
- [x] master
- [x] 3.10-stableAnthony DaviesAnthony Davieshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10661PKG samba in 3.10 does not work.2022-02-02T03:20:12ZMagicloud MagicloudsPKG samba in 3.10 does not work.- \`smbd -F\` exits immediatelly. It is supposed to stay in
foreground.
<!-- -->
- Connecting from Windows 10 crashes smbd at once.
Same environment/configuration works for Ubuntu Bionic with Samba 4.7.6.
*(from redmine: iss...- \`smbd -F\` exits immediatelly. It is supposed to stay in
foreground.
<!-- -->
- Connecting from Windows 10 crashes smbd at once.
Same environment/configuration works for Ubuntu Bionic with Samba 4.7.6.
*(from redmine: issue id 10661, created on 2019-07-08)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/10660Package request: solc2019-07-17T09:02:17ZLaurent AaproPackage request: solcHaving a native solidity compiler available instead of the ever so slow
solcjs would be just great.
It is the only thing keeping alpine from being the best OS for smart
contract development VMs.
*(from redmine: issue id 10660, create...Having a native solidity compiler available instead of the ever so slow
solcjs would be just great.
It is the only thing keeping alpine from being the best OS for smart
contract development VMs.
*(from redmine: issue id 10660, created on 2019-07-06)*
* Changesets:
* Revision 4a0700ff403b63d8eb3257ebdf33ca51eed294de by Trevis Schiffer on 2019-07-07T19:51:48Z:
```
testing/solidity: new aport
https://github.com/ethereum/solidity
The Solidity Contract-Oriented Programming Language
fixes #10660
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/10659Dropbear blocks root login2019-08-13T06:38:54ZFubuki HoshinoDropbear blocks root loginDropbear blocks root login even without -w switch given.
*(from redmine: issue id 10659, created on 2019-07-05)*
* Uploads:
* [sshd_config](/uploads/f6c87f1ad02b890bd07b574dfcf63c24/sshd_config)
* [dropbear](/uploads/0eff6b790bc0...Dropbear blocks root login even without -w switch given.
*(from redmine: issue id 10659, created on 2019-07-05)*
* Uploads:
* [sshd_config](/uploads/f6c87f1ad02b890bd07b574dfcf63c24/sshd_config)
* [dropbear](/uploads/0eff6b790bc0041ac75e925aa1f97ebe/dropbear)3.10.2https://gitlab.alpinelinux.org/alpine/aports/-/issues/10658[3.7] irssi: Use after free when sending SASL login to the server (CVE-2019-1...2019-07-23T11:06:06ZAlicha CH[3.7] irssi: Use after free when sending SASL login to the server (CVE-2019-13045)Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/sec...Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/security/irssi\_sa\_2019\_06.txt
https://www.openwall.com/lists/oss-security/2019/06/29/1
*(from redmine: issue id 10658, created on 2019-07-04, closed on 2019-07-04)*
* Relations:
* parent #10653
* Changesets:
* Revision 23cf1dbb3d0a33b1e2ee725878d76f60a53d8e32 by Natanael Copa on 2019-07-04T10:40:41Z:
```
main/irssi: security upgrade to 1.0.8 (CVE-2019-13045)
fixes #10658
```3.7.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10657[3.8] irssi: Use after free when sending SASL login to the server (CVE-2019-1...2019-09-30T12:55:26ZAlicha CH[3.8] irssi: Use after free when sending SASL login to the server (CVE-2019-13045)Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/sec...Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/security/irssi\_sa\_2019\_06.txt
https://www.openwall.com/lists/oss-security/2019/06/29/1
*(from redmine: issue id 10657, created on 2019-07-04, closed on 2019-07-04)*
* Relations:
* parent #10653
* Changesets:
* Revision 470717992bc7a9e06596b94b80804747974518e7 by Natanael Copa on 2019-07-04T10:41:45Z:
```
main/irssi: security upgrade to 1.1.3 (CVE-2019-13045)
fixes #10657
```3.8.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10656[3.9] irssi: Use after free when sending SASL login to the server (CVE-2019-1...2019-07-23T11:06:08ZAlicha CH[3.9] irssi: Use after free when sending SASL login to the server (CVE-2019-13045)Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/sec...Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/security/irssi\_sa\_2019\_06.txt
https://www.openwall.com/lists/oss-security/2019/06/29/1
*(from redmine: issue id 10656, created on 2019-07-04, closed on 2019-07-04)*
* Relations:
* parent #10653
* Changesets:
* Revision 3dc163ee30f6d8236f24f2c8704e9e5bd04261ca by Natanael Copa on 2019-07-04T10:40:39Z:
```
main/irssi: security upgrade to 1.1.3 (CVE-2019-13045)
fixes #10656
```3.9.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10655[3.10] irssi: Use after free when sending SASL login to the server (CVE-2019-...2019-07-23T11:06:09ZAlicha CH[3.10] irssi: Use after free when sending SASL login to the server (CVE-2019-13045)Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/sec...Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/security/irssi\_sa\_2019\_06.txt
https://www.openwall.com/lists/oss-security/2019/06/29/1
*(from redmine: issue id 10655, created on 2019-07-04, closed on 2019-07-04)*
* Relations:
* parent #10653
* Changesets:
* Revision 4a1b35f961328ede5ec6d878950b6f368b83a75d by Natanael Copa on 2019-07-04T10:37:24Z:
```
main/irssi: security upgrade to 1.2.1 (CVE-2019-13045)
fixes #10655
```3.10.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10654[3.11] irssi: Use after free when sending SASL login to the server (CVE-2019-...2019-07-23T11:06:11ZAlicha CH[3.11] irssi: Use after free when sending SASL login to the server (CVE-2019-13045)Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/sec...Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
SASL is enabled,
has a use after free when sending SASL login to the server.
### Fixed In Version:
Irssi 1.0.8, 1.1.3, 1.2.1
### References:
https://irssi.org/security/irssi\_sa\_2019\_06.txt
https://www.openwall.com/lists/oss-security/2019/06/29/1
*(from redmine: issue id 10654, created on 2019-07-04, closed on 2019-07-04)*
* Relations:
* parent #10653
* Changesets:
* Revision a95d7efded7650a16db9f1cfa01e95bc5513cf83 by Natanael Copa on 2019-07-04T10:36:31Z:
```
main/irssi: security upgrade to 1.2.1 (CVE-2019-13045)
fixes #10654
```3.11.0Natanael CopaNatanael Copa