alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T13:42:16Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5009Package request: GNU Octave2019-07-23T13:42:16ZalgitbotPackage request: GNU OctaveGNU Octave is a high-level interpreted language, primarily intended for
numerical computations.
https://www.gnu.org/software/octave/
*(from redmine: issue id 5009, created on 2016-01-09, closed on 2018-03-28)*GNU Octave is a high-level interpreted language, primarily intended for
numerical computations.
https://www.gnu.org/software/octave/
*(from redmine: issue id 5009, created on 2016-01-09, closed on 2018-03-28)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5008Documentation: upgrade CUPS wiki page2019-07-23T13:42:17ZalgitbotDocumentation: upgrade CUPS wiki pageCUPS is necessary for printing, but I don’t know how to deal with it on
Alpine, because the wiki page is out-of-order.
http://wiki.alpinelinux.org/wiki/Cups
Could we get it upgraded maybe with a simple user-case, like printing a
pdf? Th...CUPS is necessary for printing, but I don’t know how to deal with it on
Alpine, because the wiki page is out-of-order.
http://wiki.alpinelinux.org/wiki/Cups
Could we get it upgraded maybe with a simple user-case, like printing a
pdf? Thanks.
*(from redmine: issue id 5008, created on 2016-01-09, closed on 2019-06-19)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5007Tutorial Request - Simple package source upgrade2019-07-14T22:30:00ZDavid FavorTutorial Request - Simple package source upgradeMaybe there’s already a link for this I’m missing. Pass it along, if
this exists.
Looking for a simple tutorial showing how to upgrade source of a
package.
For example upgrading apache-2.4.17 to apache-2.4.18, where only
change
is pa...Maybe there’s already a link for this I’m missing. Pass it along, if
this exists.
Looking for a simple tutorial showing how to upgrade source of a
package.
For example upgrading apache-2.4.17 to apache-2.4.18, where only
change
is package source + checksums.
Thanks.
*(from redmine: issue id 5007, created on 2016-01-08)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5006[3.0] git: arbitrary code execution issues via URLs (CVE-2015-7545)2019-07-12T15:05:03ZAlicha CH[3.0] git: arbitrary code execution issues via URLs (CVE-2015-7545)A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, ...A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, allowing
them to execute arbitrary
code on the user’s system.
### Fixed in 2.6.1, 2.5.4, 2.4.10, 2.3.10
### References:
http://seclists.org/oss-sec/2015/q4/37
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
*(from redmine: issue id 5006, created on 2016-01-08, closed on 2016-05-31)*
* Relations:
* parent #50023.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5005[3.1] git: arbitrary code execution issues via URLs (CVE-2015-7545)2019-07-12T15:05:02ZAlicha CH[3.1] git: arbitrary code execution issues via URLs (CVE-2015-7545)A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, ...A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, allowing
them to execute arbitrary
code on the user’s system.
### Fixed in 2.6.1, 2.5.4, 2.4.10, 2.3.10
### References:
http://seclists.org/oss-sec/2015/q4/37
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
*(from redmine: issue id 5005, created on 2016-01-08, closed on 2017-09-05)*
* Relations:
* parent #50023.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5004[3.2] git: arbitrary code execution issues via URLs (CVE-2015-7545)2019-07-23T13:42:18ZAlicha CH[3.2] git: arbitrary code execution issues via URLs (CVE-2015-7545)A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, ...A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, allowing
them to execute arbitrary
code on the user’s system.
### Fixed in 2.6.1, 2.5.4, 2.4.10, 2.3.10
### References:
http://seclists.org/oss-sec/2015/q4/37
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
*(from redmine: issue id 5004, created on 2016-01-08, closed on 2017-09-05)*
* Relations:
* parent #50023.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5003[3.3] git: arbitrary code execution issues via URLs (CVE-2015-7545)2019-07-23T13:42:20ZAlicha CH[3.3] git: arbitrary code execution issues via URLs (CVE-2015-7545)A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, ...A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, allowing
them to execute arbitrary
code on the user’s system.
### Fixed in 2.6.1, 2.5.4, 2.4.10, 2.3.10
### References:
http://seclists.org/oss-sec/2015/q4/37
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
*(from redmine: issue id 5003, created on 2016-01-08, closed on 2017-09-05)*
* Relations:
* parent #50023.3.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5002git: arbitrary code execution issues via URLs (CVE-2015-7545)2019-07-23T13:42:21ZAlicha CHgit: arbitrary code execution issues via URLs (CVE-2015-7545)A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, ...A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, allowing
them to execute arbitrary
code on the user’s system.
### Fixed in 2.6.1, 2.5.4, 2.4.10, 2.3.10
### References:
http://seclists.org/oss-sec/2015/q4/37
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
*(from redmine: issue id 5002, created on 2016-01-08, closed on 2017-09-05)*
* Relations:
* child #5003
* child #5004
* child #5005
* child #5006Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5001Let's encrypt on ARM2019-07-14T22:30:30ZalgitbotLet's encrypt on ARMHi there,
Let’s encrypt won’t run on ARM image, the acme 0.2.0.dev python package
is missing.
`pkg_resources.DistributionNotFound: The 'acme==0.2.0.dev0' distribution was not found and is required by lets encrypt`
When I try to instal...Hi there,
Let’s encrypt won’t run on ARM image, the acme 0.2.0.dev python package
is missing.
`pkg_resources.DistributionNotFound: The 'acme==0.2.0.dev0' distribution was not found and is required by lets encrypt`
When I try to install it with python dev tools
(`pip install acme==0.2.0.dev0`), I got the following message:
`Could not find a version that satisfies the requirement acme==0.2.0.dev0 (from versions: 0.0.0.dev20151006, 0.0.0.dev20151008, 0.0.0.dev20151017, 0.0.0.dev20151020, 0.0.0.dev20151021, 0.0.0.dev20151024, 0.0.0.dev20151030, 0.0.0.dev20151104, 0.0.0.dev20151107, 0.0.0.dev20151108, 0.0.0.dev20151114, 0.0.0.dev20151123, 0.0.0.dev20151201, 0.1.0, 0.1.1)
No matching distribution found for acme==0.2.0.dev0`
Thanks in advance.
Cheers,
*(from redmine: issue id 5001, created on 2016-01-08)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/4999nodejs with broken crypto module after upgrading to 4.2.4-r02019-07-23T13:42:22ZAntonio Marquesnodejs with broken crypto module after upgrading to 4.2.4-r0After upgrading the nodejs package to the latest version (4.2.4-r0), the
crypto module throws the following error when calculating a hash:
alpine:~$ node -e "console.log(require('crypto').createHash('md5').update('test').digest('hex...After upgrading the nodejs package to the latest version (4.2.4-r0), the
crypto module throws the following error when calculating a hash:
alpine:~$ node -e "console.log(require('crypto').createHash('md5').update('test').digest('hex'))"
crypto.js:50
this._handle = new binding.Hash(algorithm);
^
Error: error:26078067:engine routines:ENGINE_LIST_ADD:conflicting engine id
at Error (native)
at new Hash (crypto.js:50:18)
at Object.Hash (crypto.js:49:12)
at [eval]:1:31
at Object.exports.runInThisContext (vm.js:54:17)
at Object.<anonymous> ([eval]-wrapper:6:22)
at Module._compile (module.js:435:26)
at node.js:578:27
at doNTCallback0 (node.js:419:9)
at process._tickCallback (node.js:348:13)
Using the previous version (4.2.3-r0) of the package:
alpine:~$ node -e "console.log(require('crypto').createHash('md5').update('test').digest('hex'))"
098f6bcd4621d373cade4e832627b4f6
The above error is also present when using npm:
alpine:~$ npm install express
Error: error:26078067:engine routines:ENGINE_LIST_ADD:conflicting engine id
at Error (native)
at new Hash (crypto.js:50:18)
at Object.Hash (crypto.js:49:12)
at getDefaultSessionIdContext (_tls_wrap.js:27:19)
at _tls_wrap.js:17:33
at NativeModule.compile (node.js:954:5)
at NativeModule.require (node.js:902:18)
at tls.js:221:21
at NativeModule.compile (node.js:954:5)
at NativeModule.require (node.js:902:18)
npm ERR! Linux 4.1.15-2-grsec
npm ERR! argv "/usr/bin/node" "/usr/bin/npm" "install" "express"
npm ERR! node v4.2.4
npm ERR! npm v2.14.12
npm ERR! error:26078067:engine routines:ENGINE_LIST_ADD:conflicting engine id
npm ERR!
npm ERR! If you need help, you may report this error at:
npm ERR! <https://github.com/npm/npm/issues>
crypto.js:50
this._handle = new binding.Hash(algorithm);
^
Error: error:2606906E:engine routines:ENGINE_add:internal list error
at Error (native)
at new Hash (crypto.js:50:18)
at Object.Hash (crypto.js:49:12)
at md5hex (/usr/lib/node_modules/npm/node_modules/fs-write-stream-atomic/index.js:6:21)
at getTmpname (/usr/lib/node_modules/npm/node_modules/fs-write-stream-atomic/index.js:15:27)
at new WriteStream (/usr/lib/node_modules/npm/node_modules/fs-write-stream-atomic/index.js:31:22)
at WriteStream (/usr/lib/node_modules/npm/node_modules/fs-write-stream-atomic/index.js:26:12)
at writeLogFile (/usr/lib/node_modules/npm/lib/utils/error-handler.js:394:14)
at exit (/usr/lib/node_modules/npm/lib/utils/error-handler.js:80:28)
at process.errorHandler (/usr/lib/node_modules/npm/lib/utils/error-handler.js:385:3)
*(from redmine: issue id 4999, created on 2016-01-08, closed on 2016-03-18)*
* Changesets:
* Revision 351bd62f71d4ca5138e3d4a33c94852f307cf03c by Timo Teräs on 2016-01-15T06:18:30Z:
```
main/nodejs: fix crypto hash error handling
fixes #4999
Upstream regression. Cherry-pick fix from
https://github.com/nodejs/node/issues/4221
```
* Revision 30beca0f2f1de59e9fc8632d2807da50057217aa by Timo Teräs on 2016-01-15T06:25:04Z:
```
main/nodejs: fix crypto hash error handling
fixes #4999
Upstream regression. Cherry-pick fix from
https://github.com/nodejs/node/issues/4221
(cherry picked from commit 351bd62f71d4ca5138e3d4a33c94852f307cf03c)
```
* Revision 29f1e13e6f54c24c5fac520555da38e763c6c45b by Natanael Copa on 2016-02-04T14:46:16Z:
```
main/openssl: remove padlock autoload patch
it appears they made padlock static upstream again
this fixes nodejs issues
ref #4999
```3.3.2Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4997[3.0] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)2019-07-23T13:42:23ZAlicha CH[3.0] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/g...### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/graphs\_new.php, affected versions
0.8.8f and older.
### References:
http://bugs.cacti.net/view.php?id=2646
http://svn.cacti.net/viewvc?view=rev&revision=7767
http://seclists.org/fulldisclosure/2015/Dec/att-57/cacti\_sqli%281%29.txt
http://lwn.net/Articles/670044/
*(from redmine: issue id 4997, created on 2016-01-06, closed on 2016-12-15)*
* Relations:
* parent #4992
* Changesets:
* Revision 57717bd40005bcde9547439ed69fdf006eacc625 on 2016-05-31T10:29:10Z:
```
main/cacti: security fix (CVE-2015-8377). Fixes #4997
```3.0.7Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4996[3.1] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)2019-07-23T13:42:24ZAlicha CH[3.1] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/g...### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/graphs\_new.php, affected versions
0.8.8f and older.
### References:
http://bugs.cacti.net/view.php?id=2646
http://svn.cacti.net/viewvc?view=rev&revision=7767
http://seclists.org/fulldisclosure/2015/Dec/att-57/cacti\_sqli%281%29.txt
http://lwn.net/Articles/670044/
*(from redmine: issue id 4996, created on 2016-01-06, closed on 2016-12-15)*
* Relations:
* parent #49923.1.5Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4995[3.2] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)2019-07-23T13:42:25ZAlicha CH[3.2] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/g...### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/graphs\_new.php, affected versions
0.8.8f and older.
### References:
http://bugs.cacti.net/view.php?id=2646
http://svn.cacti.net/viewvc?view=rev&revision=7767
http://seclists.org/fulldisclosure/2015/Dec/att-57/cacti\_sqli%281%29.txt
http://lwn.net/Articles/670044/
*(from redmine: issue id 4995, created on 2016-01-06, closed on 2016-12-15)*
* Relations:
* parent #49923.2.4Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4994[3.3] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)2019-07-23T13:42:27ZAlicha CH[3.3] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/g...### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/graphs\_new.php, affected versions
0.8.8f and older.
### References:
http://bugs.cacti.net/view.php?id=2646
http://svn.cacti.net/viewvc?view=rev&revision=7767
http://seclists.org/fulldisclosure/2015/Dec/att-57/cacti\_sqli%281%29.txt
http://lwn.net/Articles/670044/
*(from redmine: issue id 4994, created on 2016-01-06, closed on 2016-12-15)*
* Relations:
* parent #4992
* Changesets:
* Revision b0c8c4440c4cd0eb5b6e618106cdbae99e30b6ea by Natanael Copa on 2016-03-18T09:16:15Z:
```
main/cacti: security upgrade to 0.8.8g (CVE-2015-8369,CVE-2015-8377)
fixes #4994
```3.3.2Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4993[3.4] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)2019-07-23T13:42:29ZAlicha CH[3.4] cacti: Security issues (CVE-2015-8369, CVE-2015-8377)### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/g...### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/graphs\_new.php, affected versions
0.8.8f and older.
### References:
http://bugs.cacti.net/view.php?id=2646
http://svn.cacti.net/viewvc?view=rev&revision=7767
http://seclists.org/fulldisclosure/2015/Dec/att-57/cacti\_sqli%281%29.txt
http://lwn.net/Articles/670044/
*(from redmine: issue id 4993, created on 2016-01-06, closed on 2016-12-15)*
* Relations:
* parent #4992
* Changesets:
* Revision ec365ab813fa5ddf6d6b585f7ac673f029261ceb by Natanael Copa on 2016-03-18T09:16:37Z:
```
main/cacti: security upgrade to 0.8.8g (CVE-2015-8369, CVE-2015-8377)
fixes #4993
```3.4.0Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4992cacti: Security issues (CVE-2015-8369, CVE-2015-8377)2019-07-23T13:42:30ZAlicha CHcacti: Security issues (CVE-2015-8369, CVE-2015-8377)### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/g...### (CVE-2015-8369) SQL injection in graph.php
SQL Injection of Cacti (0.8.8f and older versions) was discovered in
graph.php
### (CVE-2015-8377) Cacti graphs\_new.php SQL Injection Vulnerability
An SQL injection was found in /cacti/graphs\_new.php, affected versions
0.8.8f and older.
### References:
http://bugs.cacti.net/view.php?id=2646
http://svn.cacti.net/viewvc?view=rev&revision=7767
http://seclists.org/fulldisclosure/2015/Dec/att-57/cacti\_sqli%281%29.txt
http://lwn.net/Articles/670044/
*(from redmine: issue id 4992, created on 2016-01-06, closed on 2016-12-15)*
* Relations:
* child #4993
* child #4994
* child #4995
* child #4996
* child #4997Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4991prefix openssl man pages2019-07-23T13:42:32ZSören Tempelprefix openssl man pagesI would suggest that we rename the openssl man pages and add a prefix
(or suffix) to them. Currently OpenSSL ships man pages for many
subcommands. For instance the man page for the verify subcommand is
currently called verify(1), since o...I would suggest that we rename the openssl man pages and add a prefix
(or suffix) to them. Currently OpenSSL ships man pages for many
subcommands. For instance the man page for the verify subcommand is
currently called verify(1), since openssl has many subcommands it can
easily conflict with other packages, by adding a prefix to the man page
we could reduce the amount of possible conflicts. For instance, the
testing/outils package would conflict with openssl since it provides man
pages for the OpenBSD commands md5, sha1, sha256 and sha512.
Assigning this to Timo since he is the maintainer of the openssl aport.
*(from redmine: issue id 4991, created on 2016-01-06, closed on 2016-05-31)*
* Relations:
* relates #4998
* Changesets:
* Revision fe6fae90f8b2017f662b7830d716c321f771e857 by Timo Teräs on 2016-01-07T07:22:22Z:
```
main/openssl: use suffix for manpages
fixes #4991
```3.4.0Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4990Package request: cachefilesd2019-07-23T13:42:33ZStephan WiencznyPackage request: cachefilesdPlease add a package for cachefilesd
http://people.redhat.com/~dhowells/cachefs/
*(from redmine: issue id 4990, created on 2016-01-04, closed on 2017-05-19)*
* Changesets:
* Revision 7506c5c402525d392ed381c3f29128fb53dc652d on 2016-...Please add a package for cachefilesd
http://people.redhat.com/~dhowells/cachefs/
*(from redmine: issue id 4990, created on 2016-01-04, closed on 2017-05-19)*
* Changesets:
* Revision 7506c5c402525d392ed381c3f29128fb53dc652d on 2016-01-05T11:26:46Z:
```
testing/cachefilesd: new aport. Fixes #4990
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/4989Support for RPi zero in Alpine Linux2019-07-23T13:42:34ZGiuliano RenziSupport for RPi zero in Alpine LinuxPlease add support in order to boot (and run) Alpine Linux on RPi zero
board. Thank you!
*(from redmine: issue id 4989, created on 2016-01-04, closed on 2017-05-19)*Please add support in order to boot (and run) Alpine Linux on RPi zero
board. Thank you!
*(from redmine: issue id 4989, created on 2016-01-04, closed on 2017-05-19)*Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4986Alpine Build of Ruby segfaults in odd conditions2019-07-23T13:42:35ZGrant McLendonAlpine Build of Ruby segfaults in odd conditionsAlso reported to [Ruby](https://bugs.ruby-lang.org/issues/11948)
Ruby segfaults in multiple instances. The easiest to reproduce is to
enter a blank line in the IRB console.
This error appears to be specific to the build of Ruby in the ...Also reported to [Ruby](https://bugs.ruby-lang.org/issues/11948)
Ruby segfaults in multiple instances. The easiest to reproduce is to
enter a blank line in the IRB console.
This error appears to be specific to the build of Ruby in the Alpine
repositories and is probably tied to one of the libraries used by Ruby.
~
bash-4.3\# irb
irb(main):001:0>
irb(main):002:0\*
/usr/lib/ruby/2.2.0/irb/input-method.rb:149: \[BUG\] Segmentation fault
at 0x00000000000010
ruby 2.2.4p230 (2015-12-16 revision 53155) \[x86\_64-linux-musl\]
— Control frame information ———————————————————————-
c:0023 p:—— s:0084 e:000083 CFUNC :output=
c:0022 p:0031 s:0080 e:000079 METHOD
/usr/lib/ruby/2.2.0/irb/input-method.rb:149
c:0021 p:0011 s:0076 e:000075 BLOCK /usr/lib/ruby/2.2.0/irb.rb:469
c:0020 p:0040 s:0073 e:000072 METHOD /usr/lib/ruby/2.2.0/irb.rb:623
c:0019 p:0009 s:0068 e:000067 BLOCK /usr/lib/ruby/2.2.0/irb.rb:468
\[FINISH\]
c:0018 p:—— s:0066 e:000065 CFUNC :call
c:0017 p:0015 s:0063 e:000062 METHOD
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:188
c:0016 p:0015 s:0059 e:000058 METHOD
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:103
c:0015 p:0022 s:0055 e:000054 METHOD
/usr/lib/ruby/2.2.0/irb/slex.rb:205
c:0014 p:0042 s:0047 e:000046 METHOD
/usr/lib/ruby/2.2.0/irb/slex.rb:75
c:0013 p:0044 s:0042 e:000041 METHOD
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:282
c:0012 p:0013 s:0038 e:000037 METHOD
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:264
c:0011 p:0022 s:0033 e:000032 BLOCK
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:235 \[FINISH\]
c:0010 p:—— s:0030 e:000029 CFUNC :loop
c:0009 p:0007 s:0027 e:000026 BLOCK
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:231 \[FINISH\]
c:0008 p:—— s:0025 e:000024 CFUNC :catch
c:0007 p:0015 s:0021 e:000020 METHOD
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:230
c:0006 p:0030 s:0018 E:000130 METHOD /usr/lib/ruby/2.2.0/irb.rb:485
c:0005 p:0008 s:0015 e:000014 BLOCK /usr/lib/ruby/2.2.0/irb.rb:395
\[FINISH\]
c:0004 p:—— s:0013 e:000012 CFUNC :catch
c:0003 p:0143 s:0009 E:002570 METHOD /usr/lib/ruby/2.2.0/irb.rb:394
c:0002 p:0021 s:0004 E:000b80 EVAL /usr/bin/irb:11 \[FINISH\]
c:0001 p:0000 s:0002 E:000bb0 TOP \[FINISH\]
— Ruby level backtrace information ————————————————————
/usr/bin/irb:11:in \`
<main>
’
/usr/lib/ruby/2.2.0/irb.rb:394:in \`start’
/usr/lib/ruby/2.2.0/irb.rb:394:in \`catch’
/usr/lib/ruby/2.2.0/irb.rb:395:in \`block in start’
/usr/lib/ruby/2.2.0/irb.rb:485:in \`eval\_input’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:230:in
\`each\_top\_level\_statement’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:230:in \`catch’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:231:in \`block in
each\_top\_level\_statement’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:231:in \`loop’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:235:in \`block (2 levels) in
each\_top\_level\_statement’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:264:in \`lex’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:282:in \`token’
/usr/lib/ruby/2.2.0/irb/slex.rb:75:in \`match’
/usr/lib/ruby/2.2.0/irb/slex.rb:205:in \`match\_io’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:103:in \`getc’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:188:in \`buf\_input’
/usr/lib/ruby/2.2.0/irb/ruby-lex.rb:188:in \`call’
/usr/lib/ruby/2.2.0/irb.rb:468:in \`block in eval\_input’
/usr/lib/ruby/2.2.0/irb.rb:623:in \`signal\_status’
/usr/lib/ruby/2.2.0/irb.rb:469:in \`block (2 levels) in eval\_input’
/usr/lib/ruby/2.2.0/irb/input-method.rb:149:in \`gets’
/usr/lib/ruby/2.2.0/irb/input-method.rb:149:in \`output=’
— Machine register context ————————————————————————
RIP: 0x00007f4657beb59a RBP: 0x0000000000000500 RSP:
0x00007ffff9166db8
RAX: 0x0000000000000000 RBX: 0x0000000000000300 RCX:
0x00007f4657e4e220
RDX: 0x000055bbc790df10 RDI: 0x000055bbc7a08f30 RSI:
0x0000000000000020
R8: 0x0000000000000300 R9: 0x00007f4657d4b2c0 R10: 0x00007f4657e4a940
R11: 0x0000000000000246 R12: 0x000055bbc7a08f30 R13:
0x00007f4657e4e520
R14: 0x00007f4657e4e528 R15: 0x00007f4657e4e52c EFL: 0x0000000000010287
— Other runtime information ———————————————————————-
- Loaded script: irb
<!-- -->
- Loaded features:
0 enumerator.so
1 rational.so
2 complex.so
3 /usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/encdb.so
4 /usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/trans/transdb.so
5 /usr/lib/ruby/2.2.0/unicode\_normalize.rb
6 /usr/lib/ruby/2.2.0/x86\_64-linux-musl/rbconfig.rb
7 thread.rb
8 /usr/lib/ruby/2.2.0/x86\_64-linux-musl/thread.so
9 /usr/local/lib/site\_ruby/2.2.0/rubygems/compatibility.rb
10 /usr/local/lib/site\_ruby/2.2.0/rubygems/defaults.rb
11 /usr/local/lib/site\_ruby/2.2.0/rubygems/deprecate.rb
12 /usr/local/lib/site\_ruby/2.2.0/rubygems/errors.rb
13 /usr/local/lib/site\_ruby/2.2.0/rubygems/version.rb
14 /usr/local/lib/site\_ruby/2.2.0/rubygems/requirement.rb
15 /usr/local/lib/site\_ruby/2.2.0/rubygems/platform.rb
16 /usr/local/lib/site\_ruby/2.2.0/rubygems/basic\_specification.rb
17 /usr/local/lib/site\_ruby/2.2.0/rubygems/stub\_specification.rb
18 /usr/local/lib/site\_ruby/2.2.0/rubygems/util/list.rb
19 /usr/lib/ruby/2.2.0/x86\_64-linux-musl/stringio.so
20 /usr/local/lib/site\_ruby/2.2.0/rubygems/specification.rb
21 /usr/local/lib/site\_ruby/2.2.0/rubygems/exceptions.rb
22 /usr/local/lib/site\_ruby/2.2.0/rubygems/core\_ext/kernel\_gem.rb
23 /usr/lib/ruby/2.2.0/monitor.rb
24
/usr/local/lib/site\_ruby/2.2.0/rubygems/core\_ext/kernel\_require.rb
25 /usr/local/lib/site\_ruby/2.2.0/rubygems.rb
26 /usr/lib/ruby/2.2.0/e2mmap.rb
27 /usr/lib/ruby/2.2.0/irb/init.rb
28 /usr/lib/ruby/2.2.0/irb/workspace.rb
29 /usr/lib/ruby/2.2.0/irb/inspector.rb
30 /usr/lib/ruby/2.2.0/irb/context.rb
31 /usr/lib/ruby/2.2.0/irb/extend-command.rb
32 /usr/lib/ruby/2.2.0/irb/output-method.rb
33 /usr/lib/ruby/2.2.0/irb/notifier.rb
34 /usr/lib/ruby/2.2.0/irb/slex.rb
35 /usr/lib/ruby/2.2.0/irb/ruby-token.rb
36 /usr/lib/ruby/2.2.0/irb/ruby-lex.rb
37 /usr/lib/ruby/2.2.0/irb/src\_encoding.rb
38 /usr/lib/ruby/2.2.0/irb/magic-file.rb
39 /usr/lib/ruby/2.2.0/x86\_64-linux-musl/readline.so
40 /usr/lib/ruby/2.2.0/irb/input-method.rb
41 /usr/lib/ruby/2.2.0/irb/locale.rb
42 /usr/lib/ruby/2.2.0/irb.rb
- Process memory map:
55bbc6e5d000-55bbc6e5e000 r-xp 00000000 fc:05 394070 /usr/bin/ruby
55bbc705d000-55bbc705e000 r—p 00000000 fc:05 394070 /usr/bin/ruby
55bbc705e000-55bbc705f000 rw-p 00001000 fc:05 394070 /usr/bin/ruby
55bbc73b3000-55bbc7a0b000 rw-p 00000000 00:00 0 \[heap\]
7f46566c3000-7f4656912000 r-xp 00000000 fc:05 394093
/usr/lib/libncursesw.so.6.0
7f4656912000-7f4656917000 r—p 0004f000 fc:05 394093
/usr/lib/libncursesw.so.6.0
7f4656917000-7f4656918000 rw-p 00054000 fc:05 394093
/usr/lib/libncursesw.so.6.0
7f4656918000-7f4656b3d000 r-xp 00000000 fc:05 394075
/usr/lib/libedit.so.0.0.53
7f4656b3d000-7f4656b40000 r—p 00025000 fc:05 394075
/usr/lib/libedit.so.0.0.53
7f4656b40000-7f4656b41000 rw-p 00028000 fc:05 394075
/usr/lib/libedit.so.0.0.53
7f4656b41000-7f4656b44000 rw-p 00000000 00:00 0
7f4656b44000-7f4656d49000 r-xp 00000000 fc:05 394798
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/readline.so
7f4656d49000-7f4656d4a000 r—p 00005000 fc:05 394798
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/readline.so
7f4656d4a000-7f4656d4b000 rw-p 00006000 fc:05 394798
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/readline.so
7f4656d4b000-7f4656f51000 r-xp 00000000 fc:05 394802
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/stringio.so
7f4656f51000-7f4656f52000 r—p 00006000 fc:05 394802
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/stringio.so
7f4656f52000-7f4656f53000 rw-p 00007000 fc:05 394802
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/stringio.so
7f4656f53000-7f4657155000 r-xp 00000000 fc:05 394805
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/thread.so
7f4657155000-7f4657156000 r—p 00002000 fc:05 394805
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/thread.so
7f4657156000-7f4657157000 rw-p 00003000 fc:05 394805
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/thread.so
7f4657157000-7f4657359000 r-xp 00000000 fc:05 394766
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/trans/transdb.so
7f4657359000-7f465735a000 r—p 00002000 fc:05 394766
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/trans/transdb.so
7f465735a000-7f465735b000 rw-p 00003000 fc:05 394766
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/trans/transdb.so
7f465735b000-7f465755c000 r-xp 00000000 fc:05 394724
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/encdb.so
7f465755c000-7f465755d000 r—p 00001000 fc:05 394724
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/encdb.so
7f465755d000-7f465755e000 rw-p 00002000 fc:05 394724
/usr/lib/ruby/2.2.0/x86\_64-linux-musl/enc/encdb.so
7f465755e000-7f46577bf000 r-xp 00000000 fc:05 394087
/usr/lib/libgmp.so.10.3.0
7f46577bf000-7f46577c1000 r—p 00061000 fc:05 394087
/usr/lib/libgmp.so.10.3.0
7f46577c1000-7f46577c2000 rw-p 00063000 fc:05 394087
/usr/lib/libgmp.so.10.3.0
7f46577c2000-7f4657bae000 r-xp 00000000 fc:05 394105
/usr/lib/libruby.so.2.2.0
7f4657bae000-7f4657bb6000 r—p 001ec000 fc:05 394105
/usr/lib/libruby.so.2.2.0
7f4657bb6000-7f4657bb7000 rw-p 001f4000 fc:05 394105
/usr/lib/libruby.so.2.2.0
7f4657bb7000-7f4657bc5000 rw-p 00000000 00:00 0
7f4657bc5000-7f4657c4c000 r-xp 00000000 fc:05 393371
/lib/ld-musl-x86\_64.so.1
7f4657d44000-7f4657d45000 r—s 00000000 fc:05 393323 /etc/localtime
7f4657d45000-7f4657d46000 —-p 00000000 00:00 0
7f4657d46000-7f4657e4c000 rw-p 00000000 00:00 0
7f4657e4c000-7f4657e4d000 r—p 00087000 fc:05 393371
/lib/ld-musl-x86\_64.so.1
7f4657e4d000-7f4657e4e000 rw-p 00088000 fc:05 393371
/lib/ld-musl-x86\_64.so.1
7f4657e4e000-7f4657e51000 rw-p 00000000 00:00 0
7ffff914b000-7ffff916e000 rw-p 00000000 00:00 0
7ffff91db000-7ffff91dd000 r—p 00000000 00:00 0 \[vvar\]
7ffff91dd000-7ffff91df000 r-xp 00000000 00:00 0 \[vdso\]
ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 \[vsyscall\]
\[NOTE\]
You may have encountered a bug in the Ruby interpreter or extension
libraries.
Bug reports are welcome.
For details: http://www.ruby-lang.org/bugreport.html
Aborted (core dumped)
~
*(from redmine: issue id 4986, created on 2016-01-04, closed on 2017-05-19)*Jakub JirutkaJakub Jirutka