alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T14:10:53Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2792[v2.4] apache2: remote DoS (CVE-2013-6438, CVE-2014-0098)2019-07-23T14:10:53ZAlexander Belous[v2.4] apache2: remote DoS (CVE-2013-6438, CVE-2014-0098)CVE-2013-6438:
The dav\_xml\_get\_cdata function in main/util.c in the mod\_dav module
in the Apache HTTP Server before 2.4.8 does not properly remove
whitespace
characters from CDATA sections, which allows remote attackers to cause ...CVE-2013-6438:
The dav\_xml\_get\_cdata function in main/util.c in the mod\_dav module
in the Apache HTTP Server before 2.4.8 does not properly remove
whitespace
characters from CDATA sections, which allows remote attackers to cause a
denial of service (daemon crash) via a crafted DAV WRITE request.
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c?r1=1528718&r2=1556428&diff\_format=h
•CONFIRM: http://www.apache.org/dist/httpd/CHANGES\_2.4.9
CVE-2014-0098:
The log\_cookie function in mod\_log\_config.c in the mod\_log\_config
module in the Apache HTTP Server before 2.4.8 allows remote attackers to
cause a denial of service (segmentation fault and daemon crash) via a
crafted cookie that is not properly handled during truncation.
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod\_log\_config.c
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod\_log\_config.c?r1=1575394&r2=1575400&diff\_format=h
•CONFIRM: http://www.apache.org/dist/httpd/CHANGES\_2.4.9
*(from redmine: issue id 2792, created on 2014-03-27, closed on 2014-04-18)*
* Relations:
* parent #2791
* Changesets:
* Revision 78e0a593413a5ed7449a690ec8c07fc81cf48362 by Natanael Copa on 2014-04-17T10:34:12Z:
```
main/apache2: security upgrade to 2.2.27 (CVE-2013-6438,CVE-2014-0098)
fixes #2792
```Alpine 2.4.12Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2791apache2: remote DoS (CVE-2013-6438, CVE-2014-0098)2019-07-23T14:10:54ZAlexander Belousapache2: remote DoS (CVE-2013-6438, CVE-2014-0098)**CVE-2013-6438:**
The dav\_xml\_get\_cdata function in main/util.c in the mod\_dav module
in the Apache HTTP Server before 2.4.8 does not properly remove
whitespace
characters from CDATA sections, which allows remote attackers to ca...**CVE-2013-6438:**
The dav\_xml\_get\_cdata function in main/util.c in the mod\_dav module
in the Apache HTTP Server before 2.4.8 does not properly remove
whitespace
characters from CDATA sections, which allows remote attackers to cause a
denial of service (daemon crash) via a crafted DAV WRITE request.
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c?r1=1528718&r2=1556428&diff\_format=h
•CONFIRM: http://www.apache.org/dist/httpd/CHANGES\_2.4.9
**CVE-2014-0098:**
The log\_cookie function in mod\_log\_config.c in the mod\_log\_config
module in the Apache HTTP Server before 2.4.8 allows remote attackers to
cause a denial of service (segmentation fault and daemon crash) via a
crafted cookie that is not properly handled during truncation.
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod\_log\_config.c
•CONFIRM:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod\_log\_config.c?r1=1575394&r2=1575400&diff\_format=h
•CONFIRM: http://www.apache.org/dist/httpd/CHANGES\_2.4.9
*(from redmine: issue id 2791, created on 2014-03-27, closed on 2014-04-18)*
* Relations:
* child #2792
* child #2793
* child #2794
* child #2795https://gitlab.alpinelinux.org/alpine/aports/-/issues/2790[v2.7] php: remote DoS (CVE-2013-7327)2019-07-23T14:10:55ZAlexander Belous[v2.7] php: remote DoS (CVE-2013-7327)The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does
not check return values, which allows remote attackers to cause a denial
of service (application crash) or possibly have unspecified other impact
via invalid imagecro...The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does
not check return values, which allows remote attackers to cause a denial
of service (application crash) or possibly have unspecified other impact
via invalid imagecrop arguments that lead to use of a NULL pointer as a
return value, a different vulnerability than CVE-2013-7226.
•CONFIRM:
http://git.php.net/?p=php-src.git;a=commit;h=8f4a5373bb71590352fd934028d6dde5bc18530b
•CONFIRM: https://bugs.php.net/bug.php?id=66356
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1065108
•UBUNTU:USN-2126-1
•URL: http://www.ubuntu.com/usn/USN-2126-1
*(from redmine: issue id 2790, created on 2014-03-27, closed on 2014-04-17)*
* Changesets:
* Revision 0e71c2e496ccd4857ae724a1a9ada95ddf18502e by Natanael Copa on 2014-04-17T09:43:41Z:
```
main/php: security upgrade to 5.5.11 (CVE-2013-7327)
fixes #2790
```Alpine 2.7.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2789[v2.6] owncloud: security and bug fixes (v6.0.2 and v5.0.15)2019-07-23T14:10:56ZAlexander Belous[v2.6] owncloud: security and bug fixes (v6.0.2 and v5.0.15)March 3, 2014 new versions with multiple security and bug fixes are
available.
See http://owncloud.org/changelog/
*(from redmine: issue id 2789, created on 2014-03-27, closed on 2014-05-23)*
* Relations:
* parent #2787March 3, 2014 new versions with multiple security and bug fixes are
available.
See http://owncloud.org/changelog/
*(from redmine: issue id 2789, created on 2014-03-27, closed on 2014-05-23)*
* Relations:
* parent #2787Alpine 2.6.7Leonardo ArenaLeonardo Arenahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2788[v2.5] owncloud: security and bug fixes (v6.0.2 and v5.0.15)2019-07-23T14:10:57ZAlexander Belous[v2.5] owncloud: security and bug fixes (v6.0.2 and v5.0.15)March 3, 2014 new versions with multiple security and bug fixes are
available.
See http://owncloud.org/changelog/
*(from redmine: issue id 2788, created on 2014-03-27, closed on 2014-04-17)*
* Relations:
* parent #2787March 3, 2014 new versions with multiple security and bug fixes are
available.
See http://owncloud.org/changelog/
*(from redmine: issue id 2788, created on 2014-03-27, closed on 2014-04-17)*
* Relations:
* parent #2787Alpine 2.5.5Leonardo ArenaLeonardo Arenahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2787owncloud: security and bug fixes (v6.0.2 and v5.0.15)2019-07-23T14:10:58ZAlexander Belousowncloud: security and bug fixes (v6.0.2 and v5.0.15)March 3, 2014 new versions with multiple security and bug fixes are
available.
See http://owncloud.org/changelog/
*(from redmine: issue id 2787, created on 2014-03-27, closed on 2014-05-23)*
* Relations:
* child #2788
* child #2789March 3, 2014 new versions with multiple security and bug fixes are
available.
See http://owncloud.org/changelog/
*(from redmine: issue id 2787, created on 2014-03-27, closed on 2014-05-23)*
* Relations:
* child #2788
* child #2789https://gitlab.alpinelinux.org/alpine/aports/-/issues/2786[v2.7] mutt: remote DoS (CVE-2014-0467)2019-07-23T14:10:59ZAlexander Belous[v2.7] mutt: remote DoS (CVE-2014-0467)Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DS...Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DSA-2874
•URL: http://www.debian.org/security/2014/dsa-2874
•REDHAT:RHSA-2014:0304
•URL: http://rhn.redhat.com/errata/RHSA-2014-0304.html
•UBUNTU:USN-2147-1
•URL: http://www.ubuntu.com/usn/USN-2147-1
*(from redmine: issue id 2786, created on 2014-03-26, closed on 2014-04-18)*
* Relations:
* parent #2782
* Changesets:
* Revision 5b35c39e2b895c6f0e79c81eba67882a17830716 by Timo Teräs on 2014-04-17T14:02:55Z:
```
main/mutt: security upgrade to 1.5.23 (CVE-2014-0467)
fixes #2786
(cherry picked from commit bb047f7e617af0cd855a32158cef5f19f3ddf529)
```Alpine 2.7.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2785[v2.6] mutt: remote DoS (CVE-2014-0467)2019-07-23T14:11:00ZAlexander Belous[v2.6] mutt: remote DoS (CVE-2014-0467)Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DS...Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DSA-2874
•URL: http://www.debian.org/security/2014/dsa-2874
•REDHAT:RHSA-2014:0304
•URL: http://rhn.redhat.com/errata/RHSA-2014-0304.html
•UBUNTU:USN-2147-1
•URL: http://www.ubuntu.com/usn/USN-2147-1
*(from redmine: issue id 2785, created on 2014-03-26, closed on 2014-04-18)*
* Relations:
* parent #2782
* Changesets:
* Revision 85615dea1a3118f880f0f6670b8d0869cf08a167 by Timo Teräs on 2014-04-17T14:06:12Z:
```
main/mutt: security upgrade to 1.5.23 (CVE-2014-0467)
fixes #2785
(cherry picked from commit bb047f7e617af0cd855a32158cef5f19f3ddf529)
Conflicts:
main/mutt/APKBUILD
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2784[v2.5] mutt: remote DoS (CVE-2014-0467)2019-07-23T14:11:01ZAlexander Belous[v2.5] mutt: remote DoS (CVE-2014-0467)Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DS...Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DSA-2874
•URL: http://www.debian.org/security/2014/dsa-2874
•REDHAT:RHSA-2014:0304
•URL: http://rhn.redhat.com/errata/RHSA-2014-0304.html
•UBUNTU:USN-2147-1
•URL: http://www.ubuntu.com/usn/USN-2147-1
*(from redmine: issue id 2784, created on 2014-03-26, closed on 2014-04-18)*
* Relations:
* parent #2782
* Changesets:
* Revision 42c5edd8adbe242324e292e45d5e0629dcd3ecd5 by Timo Teräs on 2014-04-17T14:07:18Z:
```
main/mutt: security upgrade to 1.5.23 (CVE-2014-0467)
fixes #2784
(cherry picked from commit bb047f7e617af0cd855a32158cef5f19f3ddf529)
Conflicts:
main/mutt/APKBUILD
```Alpine 2.5.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2783[v2.4] mutt: remote DoS (CVE-2014-0467)2019-07-23T14:11:02ZAlexander Belous[v2.4] mutt: remote DoS (CVE-2014-0467)Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DS...Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DSA-2874
•URL: http://www.debian.org/security/2014/dsa-2874
•REDHAT:RHSA-2014:0304
•URL: http://rhn.redhat.com/errata/RHSA-2014-0304.html
•UBUNTU:USN-2147-1
•URL: http://www.ubuntu.com/usn/USN-2147-1
*(from redmine: issue id 2783, created on 2014-03-26, closed on 2014-04-18)*
* Relations:
* parent #2782
* Changesets:
* Revision cde01b6ed9fd07efc639db755932a0cf99f3ff23 by Timo Teräs on 2014-04-17T14:08:31Z:
```
main/mutt: security upgrade to 1.5.23 (CVE-2014-0467)
fixes #2783
(cherry picked from commit bb047f7e617af0cd855a32158cef5f19f3ddf529)
Conflicts:
main/mutt/APKBUILD
```Alpine 2.4.12Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2782mutt: remote DoS (CVE-2014-0467)2019-07-23T14:11:03ZAlexander Belousmutt: remote DoS (CVE-2014-0467)Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DS...Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers
to cause a denial of service (crash) via a crafted RFC2047 header line,
related to address expansion.
•CONFIRM: http://www.mutt.org/doc/devel/ChangeLog
•DEBIAN:DSA-2874
•URL: http://www.debian.org/security/2014/dsa-2874
•REDHAT:RHSA-2014:0304
•URL: http://rhn.redhat.com/errata/RHSA-2014-0304.html
•UBUNTU:USN-2147-1
•URL: http://www.ubuntu.com/usn/USN-2147-1
*(from redmine: issue id 2782, created on 2014-03-26, closed on 2014-04-18)*
* Relations:
* child #2783
* child #2784
* child #2785
* child #2786
* Changesets:
* Revision bb047f7e617af0cd855a32158cef5f19f3ddf529 by Timo Teräs on 2014-04-17T09:21:19Z:
```
main/mutt: security upgrade to 1.5.23 (CVE-2014-0467)
ref #2782
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/2781allow udhcpc hook script parameter configuration from /etc/network/interfaces2019-07-23T14:11:04ZTimo Teräsallow udhcpc hook script parameter configuration from /etc/network/interfaces/lib/rc/sh/udhcpc-hook.sh is owned by openrc-0.11.8-r2
If I say ‘peer-dns no’ ifupdown sets IF\_PEER\_DNS=no (I think), but the
openrc script inspects only $PEER\_DNS, not $IF\_PEER\_DNS. This it’s
not possible to configure the DHCP fea.../lib/rc/sh/udhcpc-hook.sh is owned by openrc-0.11.8-r2
If I say ‘peer-dns no’ ifupdown sets IF\_PEER\_DNS=no (I think), but the
openrc script inspects only $PEER\_DNS, not $IF\_PEER\_DNS. This it’s
not possible to configure the DHCP features to use conveniently. I
believe the shipped hook works only with Gentoo style ifcfg.ethX config
files which allow setting per-interface variables.
*(from redmine: issue id 2781, created on 2014-03-26, closed on 2014-04-16)*
* Changesets:
* Revision f7ec72d86e29789c1363774aa5986b0c016599d4 by Timo Teräs on 2014-03-26T16:57:49Z:
```
main/busybox-initscripts: support 'peer-dns' in udhcpc hook
fixes #2781
```
* Revision 2da57d6463f680110959b66bd179bfca287cd027 by Timo Teräs on 2014-03-27T08:16:32Z:
```
main/busybox-initscripts: support 'peer-dns' in udhcpc hook
fixes #2781
Conflicts:
main/busybox-initscripts/APKBUILD
```
* Revision b99767df6c011a7249690eb2d8c2180173ca9355 by Timo Teräs on 2014-05-06T10:56:22Z:
```
main/busybox-initscripts: support 'peer-dns' in udhcpc hook
fixes #2781
(cherry picked from commit f7ec72d86e29789c1363774aa5986b0c016599d4)
```Alpine 2.7.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2779[v2.7] backport various lua5.2 packages2019-07-23T14:11:05ZNatanael Copa[v2.7] backport various lua5.2 packagesBackport the following packages:
- lua5.2-penlight
- uwsgi-lua
Please note that there are a dependency problem with lua5.2-penlight
that needs to be resolved.
*(from redmine: issue id 2779, created on 2014-03-25, closed on 2014-0...Backport the following packages:
- lua5.2-penlight
- uwsgi-lua
Please note that there are a dependency problem with lua5.2-penlight
that needs to be resolved.
*(from redmine: issue id 2779, created on 2014-03-25, closed on 2014-04-16)*
* Changesets:
* Revision 3eaaab362d8e55b856dc513c2bcbed581a12fe41 by Natanael Copa on 2014-03-26T08:44:34Z:
```
main/lua-penlight: add support for Lua 5.2
ref #2779
```
* Revision 0c6ff3cb4601533fb3ecdc9d44ed269fa0f33570 by Natanael Copa on 2014-03-26T08:45:56Z:
```
main/uwsgi: moved from testing
fixes #2779
```Alpine 2.7.6Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2778open-vm-tools in edge fails to install2019-07-23T14:11:06ZFrancisco Lazuropen-vm-tools in edge fails to installI’m just upgraded to edge in a Vmware virtual machine (X86\_64) and I’m
now trying to install open-vm-tools but apk fails with the following
message:
>WARNING: Ignoring /media/cdrom/apks/x86\_64/APKINDEX.tar.gz: No such
file or direc...I’m just upgraded to edge in a Vmware virtual machine (X86\_64) and I’m
now trying to install open-vm-tools but apk fails with the following
message:
>WARNING: Ignoring /media/cdrom/apks/x86\_64/APKINDEX.tar.gz: No such
file or directory
>ERROR: unsatisfiable constraints:
>so:libprocps.so.1 (missing):
>required by: open-vm-tools-9.4.0\_p1280544-r0\[so:libprocps.so.1\]
I can’t see how to install the missing dependency and I can see that
libprocps.so.3 is installed in /lib.
*(from redmine: issue id 2778, created on 2014-03-24, closed on 2019-01-10)*3.9.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/2777Moving stunnel to main repository2019-07-23T14:11:07Ziilluzion _Moving stunnel to main repositoryThe stunnel package has been tested.
Here are results:
1. It starts and works as expected, however chrooting and logging do not
work out of the box
2. It runs under nobody:nogroup be default
3. There is no start script in the curre...The stunnel package has been tested.
Here are results:
1. It starts and works as expected, however chrooting and logging do not
work out of the box
2. It runs under nobody:nogroup be default
3. There is no start script in the current package.
3.1 Example of the simple startip script has been attached to this
message.
3.2 The stunnel daemon could be stopped with the: kill -TERM \`pgrep
${NAME}\`. The standard PID feature of the start-stop-daemon does not
work with stunnel out-of-the-box.
4. There is no default stunnel.conf in the current package.
4.1 Example of the simple configuration has been attached to this
message.
5. Apk trigers do not create any log dirs with proper permissions until
then logging must be disabled
6. Apk triggers does not setup chroot feature with proper permissions
and files until then chrooting must be disabled
7. Apk trigers do not create any PID dir with proper permissions until
then pid= params must be empty
8. Apk trigers do not create any default certificate
So the stunnel is workable, however at least basic init/startup script
and stunnel.conf should be added to the paackage.
Basic **/etc/init.d/stunnel**
#!/sbin/runscript
NAME=stunnel
DAEMON=/usr/bin/$NAME
depend() {
need net
after firewall
}
start() {
ebegin "Starting ${NAME}"
start-stop-daemon --start --quiet --background \
--exec ${DAEMON} -- ${OPTS}
eend $?
}
stop() {
ebegin "Stopping ${NAME}"
start-stop-daemon --stop --quiet \
--exec ${DAEMON} \
--pidfile /var/run/${NAME}.pid
_stunnel_pids=$(pgrep ${NAME})
kill -TERM $_stunnel_pids 2>&1 >/dev/null
eend $?
}
Basic **/etc/stunnel/stunnel.conf**
setuid = nobody
setgid = nogroup
pid =
cert = /etc/ssl/private/example.com.pem
key = /etc/ssl/private/example.com.key
CAfile = /etc/ssl/certs/ca.example.com.pem
options = NO_SSLv2
options = SINGLE_ECDH_USE
options = SINGLE_DH_USE
ciphers = HIGH:!aNULL:!MD5
[imaps]
accept = 993
connect = 143
*(from redmine: issue id 2777, created on 2014-03-24, closed on 2017-04-07)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/2776dahdi-linux-grsec rebuid for 3.10.33-r12019-07-23T14:11:08ZJon Snyderdahdi-linux-grsec rebuid for 3.10.33-r1\_kpkgrel=1 then rebuild, otherwise dahdi-linux-grsec can’t be installed
on current 2.7.5.
*(from redmine: issue id 2776, created on 2014-03-20, closed on 2014-04-16)*\_kpkgrel=1 then rebuild, otherwise dahdi-linux-grsec can’t be installed
on current 2.7.5.
*(from redmine: issue id 2776, created on 2014-03-20, closed on 2014-04-16)*Alpine 2.7.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/2775squid access.log randomly dissapear - squid stops2019-07-23T14:11:08Zdino beersquid access.log randomly dissapear - squid stopscouldn’t narrow down what exactly happend. no error message available.
randomly, /var/log/squid/access.log disappears and squid stops handle
requests.
can we upgrade squid to 3.2.x latest in v2.5 please?
*(from redmine: issue id 2775,...couldn’t narrow down what exactly happend. no error message available.
randomly, /var/log/squid/access.log disappears and squid stops handle
requests.
can we upgrade squid to 3.2.x latest in v2.5 please?
*(from redmine: issue id 2775, created on 2014-03-18, closed on 2015-05-07)*
* Changesets:
* Revision fc2ad1b5b742da1b41b74c4f521c95047668cfc1 by Natanael Copa on 2014-03-26T11:01:08Z:
```
main/squid: upgrade to 3.2.13
fixes #2775
```Alpine 2.5.5https://gitlab.alpinelinux.org/alpine/aports/-/issues/2774The wpa_supplicant package should include eapol_test tool2019-07-23T14:11:09ZW FleischThe wpa_supplicant package should include eapol_test toolThe eapol\_test tool is the first choice in testing EAP RADIUS requests.
It is part of the wpa\_supplicant package but must be compiled
separately running make eapol\_test (see
http://deployingradius.com/scripts/eapol\_test/).
However, ...The eapol\_test tool is the first choice in testing EAP RADIUS requests.
It is part of the wpa\_supplicant package but must be compiled
separately running make eapol\_test (see
http://deployingradius.com/scripts/eapol\_test/).
However, there is a regression in wpa\_supplicant-2.1 not allowing the
RADIUS server to use certificates which have id-kp-clientAuth as
Extended Key Usage enabled. A bug report and working patch can be found
at http://patchwork.ozlabs.org/patch/320617/.
Could the wpa\_supplicant package be updated to include a patched
version of eapol\_test tool?
*(from redmine: issue id 2774, created on 2014-03-17, closed on 2014-05-30)*
* Changesets:
* Revision c8b073a1dd0ac4cc792df2ec8faaf01a6f88f475 by Natanael Copa on 2014-05-29T16:56:12Z:
```
main/wpa_supplicant: fix radius server regression and build eapol_test
fixes #2774
```3.0.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/2773Services binding to an IPv6 address fail to start2019-07-23T14:11:10ZW FleischServices binding to an IPv6 address fail to startServices binding to an IPv6 address fail to start in Alpine 2.6. It is
the same problem as described at
https://www.agwa.name/blog/post/beware\_the\_ipv6\_dad\_race\_condition.
It seems that there is a fix in ifupdown 0.7.45 for that
(ht...Services binding to an IPv6 address fail to start in Alpine 2.6. It is
the same problem as described at
https://www.agwa.name/blog/post/beware\_the\_ipv6\_dad\_race\_condition.
It seems that there is a fix in ifupdown 0.7.45 for that
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705996).
I can confirm that the workaround described at the first link is
working, that is, adding
`pre-up echo 0 > /proc/sys/net/ipv6/conf/bond0/accept_dad` to interfaces
config
*(from redmine: issue id 2773, created on 2014-03-17, closed on 2017-05-17)*
* Changesets:
* Revision 49aef08bd387a8d341dc67e7b3d5ade20eb228e8 by Kaarle Ritvanen on 2016-12-23T13:25:12Z:
```
main/busybox: ifup: block until DAD completion
fixes #2773
```Alpine 2.7.10https://gitlab.alpinelinux.org/alpine/aports/-/issues/2772lighttpd-1.4.35 on 2.7 fails to load apc module2019-07-23T14:11:11ZLeonardo Arenalighttpd-1.4.35 on 2.7 fails to load apc modulemyhost:~\# lighttpd -f /etc/lighttpd/lighttpd.conf -D
PHP Warning: PHP Startup: apc: Unable to initialize module
Module compiled with module API=20100525
PHP compiled with module API=20121212
These options need to match
in Unkn...myhost:~\# lighttpd -f /etc/lighttpd/lighttpd.conf -D
PHP Warning: PHP Startup: apc: Unable to initialize module
Module compiled with module API=20100525
PHP compiled with module API=20121212
These options need to match
in Unknown on line 0
PHP Warning: PHP Startup: apc: Unable to initialize module
Module compiled with module API=20100525
PHP compiled with module API=20121212
These options need to match
in Unknown on line 0
PHP Warning: PHP Startup: apc: Unable to initialize module
Module compiled with module API=20100525
PHP compiled with module API=20121212
These options need to match
in Unknown on line 0
PHP Warning: PHP Startup: apc: Unable to initialize module
Module compiled with module API=20100525
PHP compiled with module API=20121212
These options need to match
in Unknown on line 0
myhost:~\# cat /etc/php/conf.d/apc.ini
;PHP suggest APC settings
extension=apc.so
apc.enabled=1
;apc.shm\_segments=1
;apc.shm\_size=128
;apc.ttl=7200
;apc.user\_ttl=7200
;apc.num\_files\_hint=1024
;apc.mmap\_file\_mask=/tmp/apc.XXXXXX
;apc.enable\_cli=1
myhost:~\# apk version php-apc
Installed: Available:
php-apc-3.1.13-r1 ?
myhost:~\# apk version php
Installed: Available:
php-5.5.8-r0 = 5.5.8-r0
*(from redmine: issue id 2772, created on 2014-03-14, closed on 2019-06-11)*Natanael CopaNatanael Copa