aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T14:32:00Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1301setup-alpine should load 8021q when needed2019-07-23T14:32:00ZLeonardo Arenasetup-alpine should load 8021q when neededI’ve asked setup-alpine to setup a tagged bond interface.
Please observe the following:
Gateway? (or 'none') [none] 10.0.0.1
Configuration for bond0.902:
bond_slaves="eth0 eth1"
type=static
address=10.0.0.21
...I’ve asked setup-alpine to setup a tagged bond interface.
Please observe the following:
Gateway? (or 'none') [none] 10.0.0.1
Configuration for bond0.902:
bond_slaves="eth0 eth1"
type=static
address=10.0.0.21
netmask=255.255.255.0
gateway=10.0.0.1
Do you want to do any manual network configuration? [no]
DNS domain name? (e.g 'bar.com') [] vconfig: can't open '/proc/net/vlan/config': No such file or directory
vconfig: can't open '/proc/net/vlan/config': No such file or directory
Thanks!
*(from redmine: issue id 1301, created on 2012-08-07, closed on 2012-08-23)*
* Relations:
* duplicates #1212Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1298pingu fails to loadbalance ppp0 interface2019-07-23T14:32:01ZNatanael Copapingu fails to loadbalance ppp0 interfaceppp0 does not have a default route with a via address and because of
that ppp0 will not be added to the nexhop multipath route for
load-balance.
*(from redmine: issue id 1298, created on 2012-08-02, closed on 2012-08-07)*
* Changesets...ppp0 does not have a default route with a via address and because of
that ppp0 will not be added to the nexhop multipath route for
load-balance.
*(from redmine: issue id 1298, created on 2012-08-02, closed on 2012-08-07)*
* Changesets:
* Revision d7795dfcb9cc43103cfacc9112b6fb66cfc7fd35 by Natanael Copa on 2012-08-02T07:46:16Z:
```
main/pingu: fix load-balance of ppp devices
fixes #1298
They might not have a default gw address
(cherry picked from commit 33077a2b7a0dc60f2d3c2aa9f0911d2bcd699802)
```Alpine 2.4.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1297Squid 3.2 leaks file descriptors2019-07-23T14:32:02ZDuane HughesSquid 3.2 leaks file descriptorsSquid 3.2 leaks file descriptors and eventually hits the configuration
or system upper limit, causing squid process to die.
http://bugs.squid-cache.org/show\_bug.cgi?id=3577 explains this
properly. Here’s a patch that fixes this, adapte...Squid 3.2 leaks file descriptors and eventually hits the configuration
or system upper limit, causing squid process to die.
http://bugs.squid-cache.org/show\_bug.cgi?id=3577 explains this
properly. Here’s a patch that fixes this, adapted from the patch at that
link, that should work with abuild.
Thanks!
*(from redmine: issue id 1297, created on 2012-08-02, closed on 2012-08-07)*
* Changesets:
* Revision 4ecda1eeb24bee90b13fb2c4a3ddac458c22ffd1 by Natanael Copa on 2012-08-02T07:33:21Z:
```
main/squid: fix file descriptor leak
ref #1297
```
* Revision ddf8709445736e29884ca2cf0d842a8b5f93d1df by Natanael Copa on 2012-08-02T07:45:05Z:
```
main/squid: fix file descriptor leak
fixes #1297
(cherry picked from commit 4ecda1eeb24bee90b13fb2c4a3ddac458c22ffd1)
```Alpine 2.4.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1296OpenLDAP / slapd default file privileges2019-07-23T14:32:03ZJan-Hendrik DörnerOpenLDAP / slapd default file privilegesI had trouble running OpenLDAP (slapd) the way the package installed
it.
It worked after fine after the following commands (although not all of
them might be needed).
chown ldap:ldap /var/lib/openldap/openldap-data/\*
chown ldap:lda...I had trouble running OpenLDAP (slapd) the way the package installed
it.
It worked after fine after the following commands (although not all of
them might be needed).
chown ldap:ldap /var/lib/openldap/openldap-data/\*
chown ldap:ldap /var/lib/openldap/openldap-data/
chmod 700 /var/lib/openldap/openldap-data/\*
chmod 700 /var/lib/openldap/openldap-data/
chown ldap:ldap /etc/openldap/slapd.conf
chown ldap:ldap /etc/openldap/ldap.conf
chown ldap:ldap /etc/openldap/slapd.ldif
ln -s /usr/sbin/slapd /usr/lib/openldap/slapd
Regards
Jan-Hendrik
*(from redmine: issue id 1296, created on 2012-08-02, closed on 2012-08-17)*
* Changesets:
* Revision 98ea64220948bc5bd6d4c2e855c8637c21fae3b4 by Natanael Copa on 2012-08-08T07:56:23Z:
```
main/openldap: fix permissions
ref #1296
```
* Revision 334373d3149345d41ced50a010c61ec3334b854d by Natanael Copa on 2012-08-08T08:14:05Z:
```
main/openldap: fix permissions
fixes #1296
(cherry picked from commit 98ea64220948bc5bd6d4c2e855c8637c21fae3b4)
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1294segmentation Fault with lua ldap2019-07-23T14:32:04ZJan-Hendrik Dörnersegmentation Fault with lua ldapthe following generates a segmentation fault
echo ’require “lualdap”
ld = assert (lualdap.open\_simple (“ldap.server”,
“mydn=manoeljoaquim,ou=people,dc=ldap,dc=world”,
“mysecurepassword”))
’>test.lua ; lua test.lua
(of course y...the following generates a segmentation fault
echo ’require “lualdap”
ld = assert (lualdap.open\_simple (“ldap.server”,
“mydn=manoeljoaquim,ou=people,dc=ldap,dc=world”,
“mysecurepassword”))
’>test.lua ; lua test.lua
(of course you have to change the “login-values” to be valid for your
OpenLDAP-server).
*(from redmine: issue id 1294, created on 2012-08-01, closed on 2012-09-27)*
* Changesets:
* Revision 6e26e066e1995514cb6c76d657174eb293e42169 by Natanael Copa on 2012-09-16T21:02:19Z:
```
main/lua-dap: fix segfault on x86_64
ref #1294
```
* Revision e8fb4671a8eda5935adf1a3a9c72be0b51d6652a by Natanael Copa on 2012-09-16T21:12:14Z:
```
main/lua-dap: fix segfault on x86_64
fixes #1294
(cherry picked from commit 6e26e066e1995514cb6c76d657174eb293e42169)
```Alpine 2.4.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1289[v2.4] Vulnerability in bind < [9.9.1-P2|9.8.3-P2|9.7.6-P2] may allow remote ...2019-07-23T14:32:08ZLeonardo Arena[v2.4] Vulnerability in bind < [9.9.1-P2|9.8.3-P2|9.7.6-P2] may allow remote denial of servicehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
v2.4/edge
- Upgrade to 9.9.1-P2
v2.3/2.2
- Upgrade to 9.8.3-P2
v2.1
- Upgrade to 9.7.6-P2
*(from redmine: issue id 1289, created on 2012-07-31, closed on 2012-08-07)*...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
v2.4/edge
- Upgrade to 9.9.1-P2
v2.3/2.2
- Upgrade to 9.8.3-P2
v2.1
- Upgrade to 9.7.6-P2
*(from redmine: issue id 1289, created on 2012-07-31, closed on 2012-08-07)*
* Changesets:
* Revision e44b6b47ea7420c24493cede87aff22008736d8f by Natanael Copa on 2012-08-02T08:09:08Z:
```
main/bind: security upgrade to 9.9.1_p2 (CVE-2012-3817)
fixes #1289
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1287Enable Radeon KMS2019-07-23T14:32:10ZLeonardo ArenaEnable Radeon KMSCan you please enable KMS for Radeon?
CONFIG\_DRM\_RADEON\_KMS=m
Thanks!
*(from redmine: issue id 1287, created on 2012-07-30, closed on 2012-10-10)*Can you please enable KMS for Radeon?
CONFIG\_DRM\_RADEON\_KMS=m
Thanks!
*(from redmine: issue id 1287, created on 2012-07-30, closed on 2012-10-10)*Alpine 2.4.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1282[v2.4] Vulnerability in libpng < [1.5.12|1.4.12] may allow local privilege es...2019-07-23T14:32:14ZLeonardo Arena[v2.4] Vulnerability in libpng < [1.5.12|1.4.12] may allow local privilege escalationhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386
http://www.libpng.org/pub/png/libpng.html
v2.4/v2.3
- Upgrade to 1.5.12
v2.2/2.1
- Upgrade to 1.4.12
*(from redmine: issue id 1282, created on 2012-07-27, closed on 20...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386
http://www.libpng.org/pub/png/libpng.html
v2.4/v2.3
- Upgrade to 1.5.12
v2.2/2.1
- Upgrade to 1.4.12
*(from redmine: issue id 1282, created on 2012-07-27, closed on 2012-08-07)*
* Changesets:
* Revision a3b337c04610053a647eb283518f6be19f07f7bf by Natanael Copa on 2012-08-02T14:09:48Z:
```
main/libpng: security upgrade to 1.5.12 (CVE-2012-3386)
fixes #1282
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1277[v2.4] Multiple vulnerabilities in dhcp < 4.2.4-P1 may allow remote denial of...2019-07-23T14:32:18ZLeonardo Arena[v2.4] Multiple vulnerabilities in dhcp < 4.2.4-P1 may allow remote denial of servicehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571
https://kb.isc.org/article/AA-00712
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954
https://kb.isc.org/article/AA-00737
\- Upgrade to 4.2.4-P1
*(from redmin...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571
https://kb.isc.org/article/AA-00712
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954
https://kb.isc.org/article/AA-00737
\- Upgrade to 4.2.4-P1
*(from redmine: issue id 1277, created on 2012-07-27, closed on 2012-08-07)*
* Changesets:
* Revision 1a4dbb396e0c9359ae50d03c6fb8acdb3480df2d by Natanael Copa on 2012-08-02T09:54:53Z:
```
main/dhcp: security upgrade to 4.2.4_p1 (CVE-2012-3571,CVE-2012-3954)
fixes #1277
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1274doveadm: various 'unresolved symbol' in plugin libraries2019-07-23T14:32:20ZLeonardo Arenadoveadm: various 'unresolved symbol' in plugin libraries/usr/bin/doveadm: symbol 'acl_user_module': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_acl_plugin.so'.
/usr/bin/doveadm: symbol 'acl_identifier_parse': can't resolve symbol in lib '/usr/lib/dovecot/doveadm.../usr/bin/doveadm: symbol 'acl_user_module': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_acl_plugin.so'.
/usr/bin/doveadm: symbol 'acl_identifier_parse': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_acl_plugin.so'.
/usr/bin/doveadm: symbol 'expire_set_lookup': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_expire_plugin.so'.
/usr/bin/doveadm: symbol 'quota_user_module': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_quota_plugin.so'.
/usr/bin/doveadm: symbol 'quota_get_resource': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_quota_plugin.so'.
/usr/bin/doveadm: symbol 'o_stream_create_deflate': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib10_doveadm_zlib_plugin.so'.
/usr/bin/doveadm: symbol 'fts_backend_rescan': can't resolve symbol in lib '/usr/lib/dovecot/doveadm/lib20_doveadm_fts_plugin.so'.
This is dovecot-2.1.5-r0 in v2.4.
Thanks!
*(from redmine: issue id 1274, created on 2012-07-24, closed on 2012-10-11)*
* Changesets:
* Revision 2e17521140965d34b4c816a0ce6fda4300abbe15 by Natanael Copa on 2012-10-10T12:30:16Z:
```
main/dovecot: hide dl errors
like they do for openbsd.
ref #1274
```
* Revision 56e23420ef11581a65776c533fe8bca820e3b0c5 by Natanael Copa on 2012-10-10T12:41:57Z:
```
main/dovecot: hide dl errors
like they do for openbsd.
fixes #1274
(cherry picked from commit 2e17521140965d34b4c816a0ce6fda4300abbe15)
```Alpine 2.4.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1269[v2.4] Multiple vulnerabilities in php < 5.3.15 may allow remote code execution2019-07-23T14:32:25ZLeonardo Arena[v2.4] Multiple vulnerabilities in php < 5.3.15 may allow remote code executionhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688
\- Upgrade to 5.3.15
*(from redmine: issue id 1269, created on 2012-07-23, closed on 2012-08-02)*
* Changesets:...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688
\- Upgrade to 5.3.15
*(from redmine: issue id 1269, created on 2012-07-23, closed on 2012-08-02)*
* Changesets:
* Revision 08fffe9a968660587cea5659d1d7e1c0cad15b6e by Natanael Copa on 2012-07-25T09:58:32Z:
```
main/php: security upgrade to 5.3.15 (CVE-2012-2688,CVE-2012-3365)
fixes #1269
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1267[v2.4] Vulnerability in nsd < 3.2.12 may allow remote denial of service2019-07-23T14:32:26ZLeonardo Arena[v2.4] Vulnerability in nsd < 3.2.12 may allow remote denial of servicehttp://www.securityfocus.com/bid/54606/discuss
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2978
\- Upgrade to 3.2.12
*(from redmine: issue id 1267, created on 2012-07-20, closed on 2012-08-02)*
* Changesets:
* Revision...http://www.securityfocus.com/bid/54606/discuss
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2978
\- Upgrade to 3.2.12
*(from redmine: issue id 1267, created on 2012-07-20, closed on 2012-08-02)*
* Changesets:
* Revision ae02b2aa0d82ed00f1577a860859e3ec591e7c59 on 2012-07-21T08:50:40Z:
```
Security upgrade to 3.2.12 (CVE-2012-2978). Fixes #1267
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1259[v2.4] Multiple Vulnerabilities in libexif < 0.6.21 may allow remote code exe...2019-07-23T14:32:34ZLeonardo Arena[v2.4] Multiple Vulnerabilities in libexif < 0.6.21 may allow remote code executionhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841
\- Upgrade to 0.6.21
*(from redmine: issue id 1259, created on 2012-07-19, closed on 2012-08-02)*
* Changesets:
* Revision b8e5bb1c9488b158a055c14fb1b78e087cc14e85 by Natanael Copa on 2012-07-25T09:33:09Z:
```
main/libexif: security upgrade to 0.6.21 (CVE-2012-2812,CVE-2012-2813,CVE-2012-2814,CVE-2012-2836,CVE-2012-2837,CVE-2012-2840,CVE-2012-2841)
fixes #1259
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1254[v2.4] Vulnerability in asterisk < 10.5.2 may allow remote denial of service2019-07-23T14:32:38ZLeonardo Arena[v2.4] Vulnerability in asterisk < 10.5.2 may allow remote denial of servicehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3863
http://downloads.asterisk.org/pub/security/AST-2012-010.html
\- Upgrade to 10.5.2
*(from redmine: issue id 1254, created on 2012-07-19, closed on 2012-08-02)*
* Changesets...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3863
http://downloads.asterisk.org/pub/security/AST-2012-010.html
\- Upgrade to 10.5.2
*(from redmine: issue id 1254, created on 2012-07-19, closed on 2012-08-02)*
* Changesets:
* Revision afb614ea0cec6c3129ff5053fc125034241db972 by Timo Teräs on 2012-07-23T14:34:22Z:
```
main/asterisk: security upgrade to 10.5.2 (CVE-2012-3812,CVE-2012-3863)
fixes #1254
* AST-2012-10 (CVE-2012-3863) - Possible resource leak on uncompleted re-invite
* AST-2012-11 (CVE-2012-3812) - Remote crash in voice mail application
(cherry picked from commit 0279835794fd134c9ca2e7662766ffd540688e11)
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1250[v2.4] Vulnerability in libpurple < 2.10.5 may allow remote code execution2019-07-23T14:32:42ZLeonardo Arena[v2.4] Vulnerability in libpurple < 2.10.5 may allow remote code executionhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
\- Upgrade to 2.10.6
*(from redmine: issue id 1250, created on 2012-07-19, closed on 2012-08-02)*
* Changesets:
* Revision 669fdf4186680b81d6b2f29c797bcb0813e19829 by Nata...http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
\- Upgrade to 2.10.6
*(from redmine: issue id 1250, created on 2012-07-19, closed on 2012-08-02)*
* Changesets:
* Revision 669fdf4186680b81d6b2f29c797bcb0813e19829 by Natanael Copa on 2012-07-23T12:25:01Z:
```
main/pidgin: security upgrade to 2.10.6 (CVE-2012-3374)
fixes #1250
```Alpine 2.4.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/1246[v2.4] Vulnerability in tiff 3.9 may allow remote code execution2019-07-23T14:32:45ZLeonardo Arena[v2.4] Vulnerability in tiff 3.9 may allow remote code executionhttps://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2012-2088
\- Patch: https://bugzilla.redhat.com/attachment.cgi?id=578148
It can be upgraded to 3.9.6 and patched.
*(from redmine: issue id 1246, created on 2012-07-19, closed on 2012-0...https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2012-2088
\- Patch: https://bugzilla.redhat.com/attachment.cgi?id=578148
It can be upgraded to 3.9.6 and patched.
*(from redmine: issue id 1246, created on 2012-07-19, closed on 2012-08-02)*
* Changesets:
* Revision 802e64df68badda9cc8d71db7b4f9b63f8b48143 by Natanael Copa on 2012-07-23T11:56:06Z:
```
main/tiff: upgrade to 3.9.6 and fix CVE-2012-2088
fixes #1246
```Alpine 2.4.6