aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T14:33:42Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1179Package request: rsyslog2019-07-23T14:33:42Zaa latchmPackage request: rsyslogPackages rsyslog-5.8.5-r0.apk and friends from 2.3 testing repository
have finally been tested to work on alpine 2.3.
Very sorry for the delay on testing the alpine-2.3 version.
*(from redmine: issue id 1179, created on 2012-05-29, cl...Packages rsyslog-5.8.5-r0.apk and friends from 2.3 testing repository
have finally been tested to work on alpine 2.3.
Very sorry for the delay on testing the alpine-2.3 version.
*(from redmine: issue id 1179, created on 2012-05-29, closed on 2012-06-12)*
* Changesets:
* Revision 0ad18dd2ac14a8044f8b89c892855a354f5c4654 by Natanael Copa on 2012-05-30T11:05:19Z:
```
main/rsyslog: moved from testing
ref #1179
```
* Revision dbf58bdf455ca78443e104d97221551f87716d26 by Natanael Copa on 2012-05-30T11:21:23Z:
```
main/rsyslog: backport from edge
Should have been included in v2.4 from the beginning.
fixes #1179
```Alpine 2.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1181Xendomains doesn't starts correctly2019-07-23T14:33:40ZJoan Tomàs BuliartXendomains doesn't starts correctlyHi,
I have upgraded alpine linux from 2.3 to 2.4.3 and xendomains doesn’t
starts properly. The only error that daemon shows is “ERROR: xendomains
failed to start”.
After some trial and error, I detected that adding a “sleep 10” betwee...Hi,
I have upgraded alpine linux from 2.3 to 2.4.3 and xendomains doesn’t
starts properly. The only error that daemon shows is “ERROR: xendomains
failed to start”.
After some trial and error, I detected that adding a “sleep 10” between
lines 41 and 42 overcomes the problem but it isn’t a elegant solution.
I have no idea about the reason of this error nor why this simple sleep
does that it works.
In any case, as a preliminary work-around, the diff is:
--- xendomains.old
+++ xendomains
@@ -39,6 +39,7 @@
if using_screen ; then
ebegin "Creating screen session to hold domain consoles"
( screen -c ${SCREENRC:-/dev/null} -d -m -S ${SCREEN_NAME} -t dom0 \
+ && sleep 10 \
&& ${screen_cmd} zombie dr \
&& logrotate -f /etc/xen/xen-consoles.logrotate \
&& ${screen_cmd} logfile /var/log/xen-consoles/%t.log \
Can I do something to help in the bug resolution?
Many thanks in advance.
Take care,
Joan
*(from redmine: issue id 1181, created on 2012-06-01, closed on 2012-07-03)*
* Changesets:
* Revision e247ca0455a53e070f24b72688e6b6aafbdd9a11 by Natanael Copa on 2012-06-21T13:33:56Z:
```
main/xen: fix xendomains init script to wait for screen
We need wait til the detatched screen has created the connection
sockets before trying to set the opts to it.
ref #1181
```
* Revision d3bebbe06082d7805ae3d4eff2f75331155b3711 by Natanael Copa on 2012-06-22T12:49:08Z:
```
main/xen: fix xendomains init script to wait for screen
We need wait til the detatched screen has created the connection
sockets before trying to set the opts to it.
fixes #1181
(cherry picked from commit e247ca0455a53e070f24b72688e6b6aafbdd9a11)
```
* Revision a9d7e1f8072ae6fe5c6b414e16ff7978a0deb01f by Natanael Copa on 2012-06-22T14:45:48Z:
```
main/xen: use default screendir location
ref #1181
Otherwise screen -x will not work without manually setting screen dir
(cherry picked from commit 01f58adb24ce238a77eeac9569e708dbb121776d)
```Alpine 2.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1185[v2.4] Vulnerability in sudo < 1.8.4p5|1.7.9p1 may allow local privilege esca...2019-07-23T14:33:37ZLeonardo Arena[v2.4] Vulnerability in sudo < 1.8.4p5|1.7.9p1 may allow local privilege escalationhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337
Solution:
\- Upgrade to one of the following releases:
1.7.9p1, 1.8.4p5
*(from redmine: issue id 1185, created on 2012-06-10, closed on 2012-06-12)*
* Changesets:
* Revi...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337
Solution:
\- Upgrade to one of the following releases:
1.7.9p1, 1.8.4p5
*(from redmine: issue id 1185, created on 2012-06-10, closed on 2012-06-12)*
* Changesets:
* Revision 1ea772cd8969f62c32a24367fe7306c33e608070 by Natanael Copa on 2012-06-11T08:09:34Z:
```
main/sudo: security upgrade to 1.8.4_p5 (CVE-2012-2337)
fixes #1185
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1189[v2.4] Multiple vulnerabilities in wireshark < 1.6.8|1.4.13 maycode execution2019-07-23T14:33:33ZLeonardo Arena[v2.4] Multiple vulnerabilities in wireshark < 1.6.8|1.4.13 maycode executionhttp://www.wireshark.org/security/wnpa-sec-2012-08.html
http://www.wireshark.org/security/wnpa-sec-2012-09.html
http://www.wireshark.org/security/wnpa-sec-2012-10.html
Solution:
\- Upgrade to one of the following releases:
1.6.8 o...http://www.wireshark.org/security/wnpa-sec-2012-08.html
http://www.wireshark.org/security/wnpa-sec-2012-09.html
http://www.wireshark.org/security/wnpa-sec-2012-10.html
Solution:
\- Upgrade to one of the following releases:
1.6.8 or 1.4.13
*(from redmine: issue id 1189, created on 2012-06-10, closed on 2012-06-12)*
* Changesets:
* Revision 1ad9b0fb8b0185e4b33952ae8315f64a7848cb69 by Natanael Copa on 2012-06-11T08:32:10Z:
```
main/wireshark: security upgrade to 1.6.8 (CVE-2012-2392,CVE-2012-2393,CVE-2012-2394)
fixes #1189
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1193[v2.4] Multiple vulnerabilities in pidgin < 2.10.4 may allow code execution2019-07-23T14:33:29ZLeonardo Arena[v2.4] Multiple vulnerabilities in pidgin < 2.10.4 may allow code executionhttp://www.pidgin.im/news/security/?id=62
http://www.pidgin.im/news/security/?id=63
Solution:
\- Upgrade to 2.10.4
*(from redmine: issue id 1193, created on 2012-06-10, closed on 2012-06-12)*
* Changesets:
* Revision 37c31216e37...http://www.pidgin.im/news/security/?id=62
http://www.pidgin.im/news/security/?id=63
Solution:
\- Upgrade to 2.10.4
*(from redmine: issue id 1193, created on 2012-06-10, closed on 2012-06-12)*
* Changesets:
* Revision 37c31216e37839870f19ebcee838052077c940f2 by Natanael Copa on 2012-06-11T09:02:07Z:
```
main/pidgin: security upgrade to 2.10.4 (CVE-2012-2214,CVE-2012-2318)
fixes #1193
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1198[v2.4] Vulnerability in gimp < 2.8.x may allow code execution2019-07-23T14:33:24ZLeonardo Arena[v2.4] Vulnerability in gimp < 2.8.x may allow code executionhttp://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
Solution:
\- Upgrade to 2.8.x release
*(from redmine: issue id 1198, created on 2012-06-10, closed on 2012-07-03)*
* Changesets:
* Revis...http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
Solution:
\- Upgrade to 2.8.x release
*(from redmine: issue id 1198, created on 2012-06-10, closed on 2012-07-03)*
* Changesets:
* Revision 222ced7f929deb2c0d2429b3d094cee12293e1fa by Natanael Copa on 2012-07-03T12:41:03Z:
```
main/gimp: fix CVE-2012-2763
fixes #1198
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1203[v2.4] Vulnerability in arpwatch fails to drop supplementary groups2019-07-12T14:33:02ZLeonardo Arena[v2.4] Vulnerability in arpwatch fails to drop supplementary groupshttp://www.debian.org/security/2012/dsa-2481
Solution:
\- Patch:
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;filename=arpwatch\_2.1a15-1.1\_2.1a15-1.2.diff;att=1;bug=674715
*(from redmine: issue id 1203, created on 2012-06-10...http://www.debian.org/security/2012/dsa-2481
Solution:
\- Patch:
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;filename=arpwatch\_2.1a15-1.1\_2.1a15-1.2.diff;att=1;bug=674715
*(from redmine: issue id 1203, created on 2012-06-10, closed on 2012-06-11)*Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1207[v2.4] Vulnerability in bind < 9.7.6-P1|9.8.3-P1|9.9.1-P1 may allow remote de...2019-07-23T14:33:20ZLeonardo Arena[v2.4] Vulnerability in bind < 9.7.6-P1|9.8.3-P1|9.9.1-P1 may allow remote denial of servicehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
Solution:
\- Upgrade to one of the following version: 9.7.6-P1, 9.8.3-P1, 9.9.1-P1
*(from redmine: issue id 1207, created on 2012-06-10, closed on 2012-06-12)*
* Changesets...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
Solution:
\- Upgrade to one of the following version: 9.7.6-P1, 9.8.3-P1, 9.9.1-P1
*(from redmine: issue id 1207, created on 2012-06-10, closed on 2012-06-12)*
* Changesets:
* Revision 13ae5bd9ebbaab46652070d10373fbe1feb1eb9a by Natanael Copa on 2012-06-11T09:38:41Z:
```
main/bind: security upgrade to 9.9.1_p1 (CVE-2012-1667)
fixes #1207
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1211dahdi kernel modules fail to load2019-07-23T14:33:17ZDave Bowermandahdi kernel modules fail to loadalpine-2.4.3 x86, standard image.
dahdi-linux-grsec
modprobe says bad version when loading any dahdi module
modinfo reveals that none of the modules are built with CONSTIFY\_PLUGIN
and they fail to load because of that.
1. modprobe ...alpine-2.4.3 x86, standard image.
dahdi-linux-grsec
modprobe says bad version when loading any dahdi module
modinfo reveals that none of the modules are built with CONSTIFY\_PLUGIN
and they fail to load because of that.
1. modprobe dahdi
modprobe: can’t load module dahdi (dahdi/dahdi.ko): invalid module
format
<!-- -->
1. dmesg
\[ 4638.966802\] dahdi: version magic ‘3.3.7-grsec SMP mod\_unload
modversions 586 UDEREF REFCOUNT GRSEC ’ should be ‘3.3.7-grsec SMP
mod\_unload modversions 586 UDEREF REFCOUNT CONSTIFY\_PLUGIN GRSEC ’
*(from redmine: issue id 1211, created on 2012-06-20, closed on 2012-07-03)*Alpine 2.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1212vlan: does not load kernel module 8021q2019-07-23T14:33:16ZNatanael Copavlan: does not load kernel module 8021qWhen ifup a vlan interface (i.e eth0.8) the kernel module 8021q is not
automatically loaded, resulting in error:
vconfig: can't open '/proc/net/vlan/config'
Kernel module 8021q is also not loaded nor added to /etc/modules when
vlan...When ifup a vlan interface (i.e eth0.8) the kernel module 8021q is not
automatically loaded, resulting in error:
vconfig: can't open '/proc/net/vlan/config'
Kernel module 8021q is also not loaded nor added to /etc/modules when
vlans are configured with setup-interfaces (from setup-alpine).
*(from redmine: issue id 1212, created on 2012-06-21, closed on 2012-07-03)*
* Relations:
* duplicates #1301
* Changesets:
* Revision 988327007b1bdde66fd0a5f9c381076aa3828ffe by Natanael Copa on 2012-06-21T08:10:01Z:
```
main/vlan: load kernel module 8021q if needed
ref #1212
```
* Revision 5b1e5887ca71e233983d9ab73905dc4b52abd41c by Natanael Copa on 2012-06-22T12:38:13Z:
```
main/vlan: load kernel module 8021q if needed
fixes #1212
(cherry picked from commit 988327007b1bdde66fd0a5f9c381076aa3828ffe)
```Alpine 2.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1213setup-disk broken for xen dom02019-07-23T14:33:15ZNatanael Copasetup-disk broken for xen dom0When running setup-disk from alpine-xen live cd and installing on a
‘sys’ disk, the resulting disk will not boot.
- Seems like there are leftovers for pygrub support for domU in there
that disables things.
- xen-hypervisor is no...When running setup-disk from alpine-xen live cd and installing on a
‘sys’ disk, the resulting disk will not boot.
- Seems like there are leftovers for pygrub support for domU in there
that disables things.
- xen-hypervisor is not installed.
- The generated extlinux.conf will set grsec as default kernel instead
of xen hypervisor.
*(from redmine: issue id 1213, created on 2012-06-21, closed on 2012-07-03)*
* Changesets:
* Revision abaaa064e3ff78cef3c29018456d9078c418bcee by Natanael Copa on 2012-06-21T20:28:31Z:
```
setup-disk: fix install of xen dom0
ref #1213
```
* Revision 765298147a077ec68b5eaf95d73ef8aaaa9057ad by Natanael Copa on 2012-06-22T12:39:54Z:
```
main/syslinux: update-extlinux: create labels for xen dom0 kernels
ref #1213
(cherry picked from commit 7b87ff6f9c4c47383a0cb932095bb3d9211c6d58)
```
* Revision afe84d2216864fdede1a9f0263149c89e3b1f1f0 by Natanael Copa on 2012-07-02T13:00:11Z:
```
main/alpine-conf: upgrade to 2.11.2
fixes #1213
(cherry picked from commit d2a83b512559ce578088d5c626f992112747454c)
```Alpine 2.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1216[v2.4] Multiple vulnerabilities in ffmpeg < 0.10.3 may allow remote code exec...2019-07-23T14:33:12ZLeonardo Arena[v2.4] Multiple vulnerabilities in ffmpeg < 0.10.3 may allow remote code executionCVE-2012-0947, CVE-2012-2771, CVE-2012-2773, CVE-2012-2778,
CVE-2012-2780, CVE-2012-2781, CVE-2012-2805
Solution:
\- Upgrade to 0.10.3
*(from redmine: issue id 1216, created on 2012-06-28, closed on 2012-07-03)*
* Changesets:
* Re...CVE-2012-0947, CVE-2012-2771, CVE-2012-2773, CVE-2012-2778,
CVE-2012-2780, CVE-2012-2781, CVE-2012-2805
Solution:
\- Upgrade to 0.10.3
*(from redmine: issue id 1216, created on 2012-06-28, closed on 2012-07-03)*
* Changesets:
* Revision ff6557de8c2645a3597b87941bdceb28a23bce93 by Natanael Copa on 2012-07-02T11:11:11Z:
```
main/ffmpeg: security upgrade to 0.10.3 (CVE-2012-0947,CVE-2012-2771,CVE-2012-2773,CVE-2012-2778,CVE-2012-2780,CVE-2012-2781,CVE-2012-2805)
fixes #1216
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1221open-vm-tools does not support alpine linux2019-07-23T14:33:08ZCarlo Landmeteropen-vm-tools does not support alpine linuxMy logs are being spammed by open-vm-tools because it cannot locate
/etc/distrofile
user.warn vmsvc\[1096\]: \[ warning\] \[vmsvc\] HostinfoOSData: Error:
no distro file found
user.warn vmsvc\[1096\]: \[ warning\] \[guestinfo\] Failed...My logs are being spammed by open-vm-tools because it cannot locate
/etc/distrofile
user.warn vmsvc\[1096\]: \[ warning\] \[vmsvc\] HostinfoOSData: Error:
no distro file found
user.warn vmsvc\[1096\]: \[ warning\] \[guestinfo\] Failed to get OS
info.
Inside the open-vm-tools archive there is a file called hostinfoPosix.c
which has a list of “supported” operating systems/distro’s.
Not sure we can just add /etc/alpine-release and be done with it.
*(from redmine: issue id 1221, created on 2012-06-28, closed on 2012-07-03)*
* Changesets:
* Revision 96ca18de5be1e6116e4ef0fe6bc8c4ff452f4f41 by Natanael Copa on 2012-07-02T13:55:51Z:
```
main/open-vm-tools: recognize alpine linux
ref #1221
```
* Revision 651dae1c8329865d3819df8e81ce29c70ebfdcfa by Natanael Copa on 2012-07-03T07:58:19Z:
```
main/open-vm-tools: recognize alpine linux
fixes #1221
(cherry picked from commit 96ca18de5be1e6116e4ef0fe6bc8c4ff452f4f41)
Conflicts:
main/open-vm-tools/APKBUILD
```Alpine 2.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1229[v2.4] Multiple vulnerabilities in mysql < [5.1.63|5.5.25] my allow remote co...2019-07-23T14:33:00ZLeonardo Arena[v2.4] Multiple vulnerabilities in mysql < [5.1.63|5.5.25] my allow remote code executionhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1703
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1703
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1688
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0583
\- Upgrade to 5.1.63 \[v2.1\] or 5.5.25 \[v2.2 or greater\]
*(from redmine: issue id 1229, created on 2012-07-01, closed on 2012-07-03)*
* Changesets:
* Revision 9e18ca4d001907b1492d62769b4f81e0a2ec4fc9 by Natanael Copa on 2012-07-02T13:26:01Z:
```
main/mysql: security upgrade to 5.5.25 (CVE-2012-2122,CVE-2012-1703,CVE-2012-1690,CVE-2012-1688,CVE-2012-0583)
fixes #1229
```Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1233[v2.4] Multiple vulnerabilities in xen 4.1.2 and earlier may allow privilege ...2019-07-23T14:32:56ZLeonardo Arena[v2.4] Multiple vulnerabilities in xen 4.1.2 and earlier may allow privilege escalationhttp://lists.xen.org/archives/html/xen-announce/2012-06/msg00001.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218
http://cve.mitre.org/cgi-bin/cvename.cgi?...http://lists.xen.org/archives/html/xen-announce/2012-06/msg00001.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934
\- Patches available at the first link
*(from redmine: issue id 1233, created on 2012-07-01, closed on 2012-07-03)*Alpine 2.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1236restarting shorewall will mess up the default route when there are multiple2019-07-23T14:32:53ZNatanael Coparestarting shorewall will mess up the default route when there are multipleWhen there are multiple default gateways with different metric (typical
multiisp + pingu setup) and shorewall is stopped or restarted, it will
mess up the default gateway.
*(from redmine: issue id 1236, created on 2012-07-02, closed on...When there are multiple default gateways with different metric (typical
multiisp + pingu setup) and shorewall is stopped or restarted, it will
mess up the default gateway.
*(from redmine: issue id 1236, created on 2012-07-02, closed on 2012-07-03)*
* Changesets:
* Revision a589ff448766c9ee1517632189845d4914d764e6 by Natanael Copa on 2012-07-02T11:43:41Z:
```
main/shorewall-shell: add option to disable saving/restoring default route
When starting, shorewall will save all default routes. When stop, it
will try to restore it. But does it badly. On multiisp setups with pingu
it will break things.
We (ab)use the RESTORE_DEFAULT_ROUTE to make it possible to avoid
restoring the default route.
(cherry picked from commit 2c42b21247e3a50c500f5dbea1549092022c30ad)
fixes #1236
```Alpine 2.4.4Natanael CopaNatanael Copa