aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-12T14:30:22Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/889visudo: no editor found2019-07-12T14:30:22ZFabian Affoltervisudo: no editor foundvisudo is not working out-of-the-box on Alpine Linux 2.3.3
visudo: no editor found (editor path = /usr/bin/bin)
A quick fix is to make a symlink:
ln -s /bin/vi /usr/bin/vi
*(from redmine: issue id 889, created on 2012-01-03,...visudo is not working out-of-the-box on Alpine Linux 2.3.3
visudo: no editor found (editor path = /usr/bin/bin)
A quick fix is to make a symlink:
ln -s /bin/vi /usr/bin/vi
*(from redmine: issue id 889, created on 2012-01-03, closed on 2012-01-05)*
* Changesets:
* Revision dbf4b64186765adecfde1b8ce10fd628a8824a70 by Natanael Copa on 2012-01-04T07:42:36Z:
```
main/busybox: fix location for vi
ref #889
```
* Revision 0dbd42c94d6d598b20bf553b733732854b0c173c by Natanael Copa on 2012-01-04T10:54:03Z:
```
main/busybox: fix location for vi
fixes #889
(cherry picked from commit dbf4b64186765adecfde1b8ce10fd628a8824a70)
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/890busybox http redirects does not work2019-07-12T14:30:22ZNatanael Copabusybox http redirects does not workreported and fixed upstream:
http://comments.gmane.org/gmane.linux.busybox/35428
fixed in edge: commit:“ddcf387fe64b3925bed75dcea78bc64be732ebfe”
This ticket is a reminder to get the fix into v2.3.
*(from redmine: issue id 890, creat...reported and fixed upstream:
http://comments.gmane.org/gmane.linux.busybox/35428
fixed in edge: commit:“ddcf387fe64b3925bed75dcea78bc64be732ebfe”
This ticket is a reminder to get the fix into v2.3.
*(from redmine: issue id 890, created on 2012-01-04, closed on 2012-01-05)*
* Changesets:
* Revision f84672ef0817463ceece932fa9bee5ef6b2a8027 by Natanael Copa on 2012-01-04T10:53:28Z:
```
main/busybox: wget redirects fix from upstream
(cherry picked from commit ddcf387fe64b3925bed75dcea78bc64be732ebfe)
fixes #890
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/891broken /etc/apk/repositories when booting a clean/new USB2019-07-12T14:30:23ZNatanael Copabroken /etc/apk/repositories when booting a clean/new USBTo reproduce: create a bootable USB that uses UUID in syslinux.cfg
Boot it up and run setup-alpine
It will complain about not finding packages etc.
What happens is that it will use /media/$UUID when installing the
packages. This is us...To reproduce: create a bootable USB that uses UUID in syslinux.cfg
Boot it up and run setup-alpine
It will complain about not finding packages etc.
What happens is that it will use /media/$UUID when installing the
packages. This is used to generate the /etc/apk/repositories.
Later will that be relocated to /media/usb and the /media/$UUID
repository no longer works.
*(from redmine: issue id 891, created on 2012-01-04, closed on 2012-01-05)*
* Changesets:
* Revision 1b581690423ac11ecd853d8be9abe8a15a0ff146 by Natanael Copa on 2012-01-04T14:58:41Z:
```
main/mkinitfs: fix for init
we need generate the /etc/apk/repositories after we have relocated
/media/$UUID to /media/usb
ref #891
```
* Revision fda7e3a8891679e7c6bc732f9db82f3fec61661a by Natanael Copa on 2012-01-05T14:23:54Z:
```
main/mkinitfs: fix for init
we need generate the /etc/apk/repositories after we have relocated
/media/$UUID to /media/usb
fixes #891
(cherry picked from commit 1b581690423ac11ecd853d8be9abe8a15a0ff146)
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/892acf-weblog: filter out TCP_DENIED log entries2019-07-12T14:30:23ZNatanael Copaacf-weblog: filter out TCP_DENIED log entriesSome applications tries cowardly to fetch things from internet and will
retry forever if it gets an auth denied. This will flood the log and
will bring the acf-weblog log importer to the knees.
We can workaround this by not importing TC...Some applications tries cowardly to fetch things from internet and will
retry forever if it gets an auth denied. This will flood the log and
will bring the acf-weblog log importer to the knees.
We can workaround this by not importing TCP\_DENIED log lines.
*(from redmine: issue id 892, created on 2012-01-04, closed on 2012-01-17)*
* Changesets:
* Revision 7c45bf94207fd982b32d074845b810cb0c14a371 by Natanael Copa on 2012-01-17T08:14:11Z:
```
main/acf-weblog: strip TCP_DENIED from logs
ref #892
```
* Revision 09b86b364821b9b2ffc81944cc7d4c104666df8c by Natanael Copa on 2012-01-17T08:16:53Z:
```
main/acf-weblog: strip TCP_DENIED from logs
ref #892
(cherry picked from commit 7c45bf94207fd982b32d074845b810cb0c14a371)
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/894Various security flaws in openssl < 1.0.0f (v2.3)2019-07-12T14:30:24ZNatanael CopaVarious security flaws in openssl < 1.0.0f (v2.3)OpenSSL Security Advisory \[04 Jan 2012\]
=========================================
Six security flaws have been fixed in OpenSSL 1.0.0f and 0.9.8s.
DTLS Plaintext Recovery Attack (CVE-2011-4108)
---------------------------------------...OpenSSL Security Advisory \[04 Jan 2012\]
=========================================
Six security flaws have been fixed in OpenSSL 1.0.0f and 0.9.8s.
DTLS Plaintext Recovery Attack (CVE-2011-4108)
----------------------------------------------
Nadhem Alfardan and Kenny Paterson have discovered an extension of the
Vaudenay padding oracle attack on CBC mode encryption which enables an
efficient plaintext recovery attack against the OpenSSL implementation
of DTLS. Their attack exploits timing differences arising during
decryption processing. A research paper describing this attack can be
found at http://www.isg.rhul.ac.uk/~kp/dtls.pdf
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
<seggelmann@fh-muenster.de>and Michael Tuexen
<tuexen@fh-muenster.de>
for preparing the fix.
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s.
Double-free in Policy Checks (CVE-2011-4109)
--------------------------------------------
If X509\_V\_FLAG\_POLICY\_CHECK is set in OpenSSL 0.9.8, then a policy
check failure can lead to a double-free. The bug does not occur
unless this flag is set. Users of OpenSSL 1.0.0 are not affected.
This flaw was discovered by Ben Laurie and a fix provided by Emilia
Kasper <ekasper@google.com>of Google.
Affected users should upgrade to OpenSSL 0.9.8s.
Uninitialized SSL 3.0 Padding (CVE-2011-4576)
---------------------------------------------
OpenSSL prior to 1.0.0f and 0.9.8s failed to clear the bytes used as
block cipher padding in SSL 3.0 records. This affects both clients and
servers that accept SSL 3.0 handshakes: those that call SSL\_CTX\_new
with
SSLv3\_{server|client}\_method or SSLv23\_{server|client}\_method. It
does
not affect TLS.
As a result, in each record, up to 15 bytes of uninitialized memory
may be sent, encrypted, to the SSL peer. This could include sensitive
contents of previously freed memory.
However, in practice, most deployments do not use
SSL\_MODE\_RELEASE\_BUFFERS and therefore have a single write buffer
per
connection. That write buffer is partially filled with non-sensitive,
handshake data at the beginning of the connection and, thereafter,
only records which are longer any any previously sent record leak any
non-encrypted data. This, combined with the small number of bytes
leaked per record, serves to limit to severity of this issue.
Thanks to Adam Langley <agl@chromium.org>for identifying and
fixing
this issue.
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s.
Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
--------------------------------------------------------------------
RFC 3779 data can be included in certificates, and if it is malformed,
may trigger an assertion failure. This could be used in a
denial-of-service attack.
Note, however, that in the standard release of OpenSSL, RFC 3779
support is disabled by default, and in this case OpenSSL is not
vulnerable. Builds of OpenSSL are vulnerable if configured with
“enable-rfc3779”.
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw, and
Rob Austein <sra@hactrn.net>for fixing it.
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s.
SGC Restart DoS Attack (CVE-2011-4619)
--------------------------------------
Support for handshake restarts for server gated cryptograpy (SGC) can
be used in a denial-of-service attack.
Thanks to Adam Langley <agl@chromium.org>for identifying and
fixing
this issue.
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s.
Invalid GOST parameters DoS Attack (CVE-2012-0027)
--------------------------------------------------
A malicious TLS client can send an invalid set of GOST parameters
which will cause the server to crash due to lack of error checking.
This could be used in a denial-of-service attack.
Only users of the OpenSSL GOST ENGINE are affected by this bug.
Thanks to Andrey Kulikov <amdeich@gmail.com>for identifying and
fixing
this issue.
Affected users should upgrade to OpenSSL 1.0.0f.
References
----------
URL for this Security Advisory:
http://www.openssl.org/news/secadv\_20120104.txt
*(from redmine: issue id 894, created on 2012-01-05, closed on 2012-01-05)*
* Relations:
* relates #893
* relates #895
* relates #896
* Changesets:
* Revision f08c94f1e46e488c685a092a6f99f45b4c35d451 by Natanael Copa on 2012-01-05T14:44:05Z:
```
main/openssl: security upgrade to 1.0.0f
CVE-2011-4108
CVE-2011-4109
CVE-2011-4576
CVE-2011-4577
CVE-2011-4619
CVE-2012-0027
fixes #894
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/900Vulnerability in libarchive < 3.0.0 may allow remote code execution2019-07-12T14:30:28ZLeonardo ArenaVulnerability in libarchive < 3.0.0 may allow remote code executionhttps://bugzilla.redhat.com/show\_bug.cgi?id=705849
Patches included in report above do not apply cleanly to 2.8.5.
Solution:
\- Upgrade to v3.0.2
*(from redmine: issue id 900, created on 2012-01-06, closed on 2012-01-16)*
* Change...https://bugzilla.redhat.com/show\_bug.cgi?id=705849
Patches included in report above do not apply cleanly to 2.8.5.
Solution:
\- Upgrade to v3.0.2
*(from redmine: issue id 900, created on 2012-01-06, closed on 2012-01-16)*
* Changesets:
* Revision 7b5d3b5c85b8593242c7c87d9fb7ef547e44dfd4 by Natanael Copa on 2012-01-10T13:00:32Z:
```
main/libarchive: security upgrade to 3.0.2
CVE-2010-4666
CVE-2011-1777
CVE-2011-1778
CVE-2011-1779)
fixes #900
```Alpine 2.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/904Vulnerability in unbound < 1.4.13p2 may allow remote denial of service2019-07-12T14:30:30ZLeonardo ArenaVulnerability in unbound < 1.4.13p2 may allow remote denial of servicehttp://www.unbound.net/downloads/CVE-2011-4528.txt
Solution:
\- Upgrade to 1.4.13p2
*(from redmine: issue id 904, created on 2012-01-06, closed on 2012-01-16)*
* Changesets:
* Revision 9299321188c76c3510277fc1a49a8be2b27f22f5 by N...http://www.unbound.net/downloads/CVE-2011-4528.txt
Solution:
\- Upgrade to 1.4.13p2
*(from redmine: issue id 904, created on 2012-01-06, closed on 2012-01-16)*
* Changesets:
* Revision 9299321188c76c3510277fc1a49a8be2b27f22f5 by Natanael Copa on 2012-01-10T13:18:43Z:
```
main/unbound: security fix (CVE-2011-4528)
http://www.unbound.net/downloads/CVE-2011-4528.txt
fixes #904
```Alpine 2.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/906Cross-Site Scripting Vulnerability in phpMyAdmin < 3.4.92019-07-12T14:30:30ZLeonardo ArenaCross-Site Scripting Vulnerability in phpMyAdmin < 3.4.9http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4782
Solutions:
\- Patch:
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=0e707906e69ce90c4852a0fce2a0fac7db86a3cd;hp=bd3735ba584e7a49ae...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4782
Solutions:
\- Patch:
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=0e707906e69ce90c4852a0fce2a0fac7db86a3cd;hp=bd3735ba584e7a49aee78813845245354b061f61
or
\- Upgrade to 3.4.9
*(from redmine: issue id 906, created on 2012-01-06, closed on 2012-01-16)*
* Changesets:
* Revision db5342a8f067c8fa7f416df0b1bce672cb9de0ad by Natanael Copa on 2012-01-10T13:24:24Z:
```
main/phpmyadmin: security upgrade to 3.4.9 (CVE-2011-4782)
fixes #906
(cherry picked from commit 0f63e4db14936f1f52c1958afda881f09036c8f7)
```Alpine 2.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/909Vulnerability in icu < 4.9 may allow remote code execution2019-07-12T14:30:32ZLeonardo ArenaVulnerability in icu < 4.9 may allow remote code executionhttps://bugzilla.redhat.com/show\_bug.cgi?id=765812
Solution:
\- Patch:
http://bugs.icu-project.org/trac/raw-attachment/ticket/8984/canonicalize2.patch
*(from redmine: issue id 909, created on 2012-01-06, closed on 2012-01-16)*
* Ch...https://bugzilla.redhat.com/show\_bug.cgi?id=765812
Solution:
\- Patch:
http://bugs.icu-project.org/trac/raw-attachment/ticket/8984/canonicalize2.patch
*(from redmine: issue id 909, created on 2012-01-06, closed on 2012-01-16)*
* Changesets:
* Revision a9f1aa0785594722dbcebdf6b8c243a6c616a269 by Natanael Copa on 2012-01-10T14:36:25Z:
```
main/icu: security fix (CVE-2011-4599)
fixes #909
(cherry picked from commit 2a47152a439b9747205655ca71541a917bbc6157)
Conflicts:
main/icu/APKBUILD
```Alpine 2.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/913Vulnerabilty in heimdal <= 1.5.1 may allow remote code execution2019-07-12T14:30:34ZLeonardo ArenaVulnerabilty in heimdal <= 1.5.1 may allow remote code executionhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
Currently exploited in the wild
Solution:
\- Patch: http://security.freebsd.org/patches/SA-11:08/telnetd.patch
or
\- Upgrade to 1.5.1
*(from redmine: issue id 913, create...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
Currently exploited in the wild
Solution:
\- Patch: http://security.freebsd.org/patches/SA-11:08/telnetd.patch
or
\- Upgrade to 1.5.1
*(from redmine: issue id 913, created on 2012-01-06, closed on 2012-01-16)*
* Changesets:
* Revision aec8070d40f61980210134fec4b6ef9ba937a5a7 by Natanael Copa on 2012-01-10T14:55:12Z:
```
main/heimdal: security fix (CVE-2011-4862)
fixes #913
(cherry picked from commit f81ee55cee797b4203340cebc3f15691ac93faeb)
```Alpine 2.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/919Vulnerability in php < 5.3.9 may allow remote denial of service2019-07-12T14:30:36ZLeonardo ArenaVulnerability in php < 5.3.9 may allow remote denial of servicehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885
Solutions:
\- Upgrade to 5.3.9
or
\- Patch available in revision 321003 of 5.3 branch (Added
max\_input\_vars directive to prevent attacks based on hash collision)
*(from ...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885
Solutions:
\- Upgrade to 5.3.9
or
\- Patch available in revision 321003 of 5.3 branch (Added
max\_input\_vars directive to prevent attacks based on hash collision)
*(from redmine: issue id 919, created on 2012-01-06, closed on 2012-01-17)*
* Changesets:
* Revision 651558b41f361eb94133a5a1c1c9f767e9574036 by Natanael Copa on 2012-01-10T15:56:44Z:
```
main/php: security fix (CVE-2011-4885)
fixes #919
(cherry picked from commit 048cf16b51fd845e1c8aeb09437cec687e83228f)
```Alpine 2.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/923conntrackd does not work2019-07-12T14:30:38ZTimo Teräsconntrackd does not workMultiple problems:
- init.d tries to start /usr/bin/conntrackd, where as it is in
/usr/sbin
- the config provided by .apk is /etc/conntrackd when
/etc/conntrackd/conntrackd.conf is expected by init.d
- conntrackd dies with...Multiple problems:
- init.d tries to start /usr/bin/conntrackd, where as it is in
/usr/sbin
- the config provided by .apk is /etc/conntrackd when
/etc/conntrackd/conntrackd.conf is expected by init.d
- conntrackd dies with seg.fault when above problems are corrected
*(from redmine: issue id 923, created on 2012-01-10, closed on 2012-01-16)*
* Changesets:
* Revision 7389f43283c2df3b4c7e7072942de87acef26c80 by Natanael Copa on 2012-01-10T09:34:48Z:
```
main/conntrack-tools: fix default config
fixes #923
```
* Revision c67c34ae9ef6de6a26275c79b2852445ecc522ef by Natanael Copa on 2012-01-10T10:58:15Z:
```
main/conntrack-tools: fix defalt config file
fixes #923
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/929php < 5.3.9 Integer overflow during the parsing of invalid exif header - CVE-...2019-07-12T14:30:40ZNatanael Copaphp < 5.3.9 Integer overflow during the parsing of invalid exif header - CVE-2011-4566 (v2.3)http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566
https://bugs.php.net/bug.php?id=60150
*(from redmine: issue id 929, created on 2012-01-17, closed on 2012-01-17)*
* Relations:
* relates #928
* Changesets:
* Revision c...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566
https://bugs.php.net/bug.php?id=60150
*(from redmine: issue id 929, created on 2012-01-17, closed on 2012-01-17)*
* Relations:
* relates #928
* Changesets:
* Revision c3fd601a1366a7d9df16946d0f48234467c98930 by Natanael Copa on 2012-01-17T09:43:18Z:
```
main/php: security upgrade to 5.3.9 (CVE-2011-4566)
fixes #929
(cherry picked from commit 56856330d45dacc0db81240dcdf2a76fb805f2bd)
```Alpine 2.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/933tinydns is broke on x86_642019-07-12T14:30:42ZNatanael Copatinydns is broke on x86_64seems like tinydns is broke on x86\_64
$ cat /etc/tinydns/example.com
Zexample.com:127.0.0.5:abuse.example.net:2008032201:1000:2000:3000:4000
&example.com:127.0.0.5:something:
without the patch from
commit:“564452f0de9f0b0...seems like tinydns is broke on x86\_64
$ cat /etc/tinydns/example.com
Zexample.com:127.0.0.5:abuse.example.net:2008032201:1000:2000:3000:4000
&example.com:127.0.0.5:something:
without the patch from
commit:“564452f0de9f0b04d025b3a06480896206d9e596”:
$ uname -m
x86_64
$ drill NS example.com @127.0.0.1
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 28121
;; flags: qr aa rd ; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; QUESTION SECTION:
;; example.com. IN NS
;; ANSWER SECTION:
example.com. 259200 IN NS something.ns.example.com.
;; AUTHORITY SECTION:
;; ADDITIONAL SECTION:
something.ns.example.com. 259200 IN A 127.0.0.5
;; Query time: 0 msec
;; SERVER: 127.0.0.1
;; WHEN: Tue Jan 17 15:26:21 2012
;; MSG SIZE rcvd: 72
With the current edge:
$ drill NS example.com @127.0.0.1
;; No packet received
*(from redmine: issue id 933, created on 2012-01-17, closed on 2012-01-18)*
* Changesets:
* Revision 8320da39831b707a01f1212dd759f4f92d03aeb4 by Natanael Copa on 2012-01-18T15:06:21Z:
```
main/djbdns: fix tinydns on 64 bit
The jumbo patch includes the 32bit version of the generated header files.
This might break 64 bit builds depending on unpacking timestamps etc.
We fix it by removing the generated headers
ref #933
```
* Revision 9522f53d78e887a4081f028662e6ae9bda6a04c7 by Natanael Copa on 2012-01-18T15:17:03Z:
```
main/djbdns: fix tinydns on 64 bit - including uint32.h
The jumbo patch includes the 32bit version of the generated header files.
This might break 64 bit builds depending on unpacking timestamps etc.
We fix it by removing the generated headers, including uint32.h
ref #933
```
* Revision fbae5800c59a95522d4460080d9ab73c1493d868 by Natanael Copa on 2012-01-18T15:30:52Z:
```
main/djbdns: fix tinydns on 64 bit - including uint32.h
The jumbo patch includes the 32bit version of the generated header files.
This might break 64 bit builds depending on unpacking timestamps etc.
We fix it by removing the generated headers, including uint32.h
fixes #933
(cherry picked from commit 9522f53d78e887a4081f028662e6ae9bda6a04c7)
```Alpine 2.3.4Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/934Kamailio ctl file error - sercmd does not work2019-07-12T14:30:43ZStephen MunKamailio ctl file error - sercmd does not workYou can add “modparam (”ctl“, ”binrpc“, ”unix:/tmp/sercmd\_ctl“)” in the
config as a workaround
The patch is available at
http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=1b58b26b7ccf7b2c01185a22ad076a3655e43664
*...You can add “modparam (”ctl“, ”binrpc“, ”unix:/tmp/sercmd\_ctl“)” in the
config as a workaround
The patch is available at
http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=1b58b26b7ccf7b2c01185a22ad076a3655e43664
*(from redmine: issue id 934, created on 2012-01-18, closed on 2012-01-18)*
* Changesets:
* Revision ad7fa8b09157b1b45ed3579993ab5acb2810d512 on 2012-01-18T14:04:20Z:
```
main/kamailio/APKBUILD: 3.2.1 version, added xcap_server in presence package
fixes #934
(cherry picked from commit eb52bddeda62921f49c515c6d2f9cac097988a73)
```Alpine 2.3.4Natanael CopaNatanael Copa