<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://forum.alpinelinux.org"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Alpine Linux forums - Common Vulnerabilities and Exposures</title>
 <link>https://forum.alpinelinux.org/taxonomy/term/14</link>
 <description></description>
 <language>en</language>
<item>
 <title>Making Clamav 0.99.3-r1 available in non-edge repos</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/making-clamav-0993-r1-available-non-edge-repos</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Clamav 0.99.3-r1 has several security fixes: &lt;br /&gt;&lt;a href=&quot;http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html&quot; rel=&quot;nofollow&quot;&gt;http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;However, this package is only available in the edge repository for alpine distros. Are there plans to have this available in non-edge repos?&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Mon, 12 Feb 2018 17:14:00 +0000</pubDate>
 <dc:creator>rgutie01</dc:creator>
 <guid isPermaLink="false">19476 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/making-clamav-0993-r1-available-non-edge-repos#comments</comments>
</item>
<item>
 <title>firefox privacy problem</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/firefox-privacy-problem</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;turn off following configuration:&lt;/p&gt;

&lt;p&gt;Preferences &amp;gt;  Privacy &amp;amp; Security &amp;gt; Firefox Data Collection and Use&lt;/p&gt;

&lt;p&gt; Allow Firefox to install and run studies&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://sircmpwn.github.io/2017/12/16/Firefox-is-on-a-slippery-slope.html&quot; rel=&quot;nofollow&quot;&gt;https://sircmpwn.github.io/2017/12/16/Firefox-is-on-a-slippery-slope.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://news.ycombinator.com/item?id=15940144&quot; rel=&quot;nofollow&quot;&gt;https://news.ycombinator.com/item?id=15940144&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://github.com/MrAlex94/Waterfox&quot; rel=&quot;nofollow&quot;&gt;https://github.com/MrAlex94/Waterfox&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Sun, 17 Dec 2017 19:48:38 +0000</pubDate>
 <dc:creator>mmix</dc:creator>
 <guid isPermaLink="false">19347 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/firefox-privacy-problem#comments</comments>
</item>
<item>
 <title>Need help with erlang-inets package </title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/need-help-erlang-inets-package</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Hi,&lt;/p&gt;

&lt;p&gt;I&#039;m using Alpine RabbitMQ docker image and our security team has found unencrypted private keys in erlang-inets example package. Because of this our product has failed in security vulnerability test. I know this certificate is just a example one, however as the appcheck tool finds it, will be difficult to pass the test.&lt;/p&gt;

&lt;p&gt;Can we somehow custom build erlang-inets removing the examples or is there a way to remove the example folder from the package. Could someone please help.&lt;/p&gt;

&lt;p&gt;Regards,&lt;br /&gt;
Nihar&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Wed, 22 Nov 2017 07:37:51 +0000</pubDate>
 <dc:creator>nihar_pattanaik</dc:creator>
 <guid isPermaLink="false">19275 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/need-help-erlang-inets-package#comments</comments>
</item>
<item>
 <title>Bug #7357: Is there an ETA for 3.5.3?</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/bug-7357-there-eta-353</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Hi all,&lt;/p&gt;

&lt;p&gt;First off, thank you for the work you all put into maintaining Alpine. It is appreciated.&lt;/p&gt;

&lt;p&gt;I was wondering when the 3.5.x branch might see its next release? A few CVEs had their fix merged 3 months ago (&lt;a href=&quot;http://bugs.alpinelinux.org/issues/7357&quot; rel=&quot;nofollow&quot;&gt;http://bugs.alpinelinux.org/issues/7357&lt;/a&gt;), but haven&#039;t yet seen release. I understand there is in general no firm release cadence; just am wondering if there is an estimate available on when might be released.&lt;/p&gt;

&lt;p&gt;Our use case: our Docker application is based on mhart/alpine-node:7, which is based on alpine:3.5 (If you&#039;re curious, the official node:alpine-7 is on alpine:3.4, so is even older). Neither of which are likely maintained, as Node.js 7.x is not maintained. Images based on mhart/alpine-node:7 that are scanned with a security tool like Twistlock report a few of the vulnerabilities that were addressed in the above-linked bug.&lt;/p&gt;

&lt;p&gt;Thanks in advance!&lt;/p&gt;

&lt;p&gt;Cheers,&lt;br /&gt;
Spencer&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Tue, 05 Sep 2017 23:14:53 +0000</pubDate>
 <dc:creator>spencerwilson-optimizely</dc:creator>
 <guid isPermaLink="false">19170 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/bug-7357-there-eta-353#comments</comments>
</item>
<item>
 <title>chrome firefox package vulnerable from phishing attack</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/chrome-firefox-package-vulnerable-phishing-attack</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;chrome and firefox package from alpine linux are not safe from phishing attack.&lt;/p&gt;

&lt;p&gt;latest chrome version safe but the version from alpine linux is 57.0.2987.133 (64-bit) which is NOT safe.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.wordfence.com/blog/2017/04/chrome-firefox-unicode-phishing/&quot; rel=&quot;nofollow&quot;&gt;https://www.wordfence.com/blog/2017/04/chrome-firefox-unicode-phishing/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;bb-quote&quot;&gt;Quote:&lt;blockquote class=&quot;bb-quote-body&quot;&gt;Chrome has just released version 58.0.3029.81. We have confirmed that this resolves the issue and that our ‘epic.com’ test domain no longer shows as ‘epic.com’ and displays the raw punycode instead, which is ‘www.xn--e1awd7f.com’, making it clear that the domain is not ‘epic.com’. We encourage all Chrome users to immediately update to the above version of Chrome to resolve the issue. &lt;/blockquote&gt;&lt;/div&gt;

&lt;p&gt;At this moment(2017.04.26), don&#039;t click the link at the site that you don&#039;t trust in alpine linux environment&lt;/p&gt;

&lt;p&gt;--&lt;br /&gt;
PS: &lt;br /&gt;
How to fix this in Firefox:&lt;br /&gt;
In your firefox location bar, type ‘about:config’ without quotes.&lt;br /&gt;
Do a search for ‘punycode’ without quotes.&lt;br /&gt;
You should see a parameter titled: network.IDN_show_punycode&lt;br /&gt;
Change the value from false to true.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Wed, 26 Apr 2017 14:31:18 +0000</pubDate>
 <dc:creator>mmix</dc:creator>
 <guid isPermaLink="false">19027 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/chrome-firefox-package-vulnerable-phishing-attack#comments</comments>
</item>
<item>
 <title>openssl CVE-2016-2180</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/openssl-cve-2016-2180</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Do alpine have any plan to fix this vulnerable?&lt;/p&gt;

&lt;p&gt;Below link is a patch to fix this vulnerable:&lt;br /&gt;&lt;a href=&quot;https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a&quot; rel=&quot;nofollow&quot;&gt;https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a&lt;/a&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Mon, 29 Aug 2016 00:36:06 +0000</pubDate>
 <dc:creator>sword</dc:creator>
 <guid isPermaLink="false">18822 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/openssl-cve-2016-2180#comments</comments>
</item>
<item>
 <title>Is there something like the &#039;-security&#039; lists of other distros?</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/there-something-security-lists-other-distros</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;I just read about Alpine Linux in this week&#039;s Distrowatch Weekly. This looks very interesting, and I&#039;d like to look into it during my (limited) spare time. One question I have is whether the Apline package maintainers track and report which CVEs are fixed in which releases. In particular, if a security patch is applied to a release, then I presume the package version number would be bumped; in that case, would there be something that says &quot;fixed CVE-xxxx-yyy&quot;? Is there something that would collect those? &lt;/p&gt;

&lt;p&gt;I saw the cvewatcher package described on this forum, and it looks promising. But, there is the caveat that it only looks at the package version and will have false positives if the CVE has been patched. &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Mon, 06 Jul 2015 19:21:52 +0000</pubDate>
 <dc:creator>Pearson</dc:creator>
 <guid isPermaLink="false">18566 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/there-something-security-lists-other-distros#comments</comments>
</item>
<item>
 <title>Ghost (CVE-2015-0235)</title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/ghost-cve-2015-0235</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Is Alpine Linux 3.1 (or other version) vulnerable to GHOST?  &lt;a href=&quot;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability&quot; rel=&quot;nofollow&quot;&gt;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Wed, 28 Jan 2015 18:49:38 +0000</pubDate>
 <dc:creator>bwhite</dc:creator>
 <guid isPermaLink="false">18414 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/ghost-cve-2015-0235#comments</comments>
</item>
<item>
 <title>xorg-server: a 20 year old security bug </title>
 <link>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/xorg-server-20-year-old-security-bug</link>
 <description>&lt;div class=&quot;field field-name-taxonomy-forums field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Forums:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/forums/common-vulnerabilities-and-exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;I inaugurate this section...;-)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://lists.freedesktop.org/archives/xorg/2013-October/056074.html&quot; rel=&quot;nofollow&quot;&gt;http://lists.freedesktop.org/archives/xorg/2013-October/056074.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Regards.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Fri, 18 Oct 2013 18:15:04 +0000</pubDate>
 <dc:creator>AmatCoder</dc:creator>
 <guid isPermaLink="false">15663 at https://forum.alpinelinux.org</guid>
 <comments>https://forum.alpinelinux.org/forum/common-vulnerabilities-and-exposures/xorg-server-20-year-old-security-bug#comments</comments>
</item>
</channel>
</rss>
