aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T11:34:02Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8681[3.8] sqlite: NULL Pointer Dereference (CVE-2018-8740)2019-07-23T11:34:02ZAlicha CH[3.8] sqlite: NULL Pointer Dereference (CVE-2018-8740)In SQLite through 3.22.0, databases whose schema is corrupted using a
CREATE TABLE AS statement
could cause a NULL pointer dereference, related to build.c and
prepare.c.
### References:
http://openwall.com/lists/oss-security/2018/03/...In SQLite through 3.22.0, databases whose schema is corrupted using a
CREATE TABLE AS statement
could cause a NULL pointer dereference, related to build.c and
prepare.c.
### References:
http://openwall.com/lists/oss-security/2018/03/17/1
https://nvd.nist.gov/vuln/detail/CVE-2018-8740
### Patch:
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
*(from redmine: issue id 8681, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8680
* parent #86803.8.0Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8680sqlite: NULL Pointer Dereference (CVE-2018-8740)2019-07-23T11:34:03ZAlicha CHsqlite: NULL Pointer Dereference (CVE-2018-8740)In SQLite through 3.22.0, databases whose schema is corrupted using a
CREATE TABLE AS statement
could cause a NULL pointer dereference, related to build.c and
prepare.c.
### References:
http://openwall.com/lists/oss-security/2018/03/...In SQLite through 3.22.0, databases whose schema is corrupted using a
CREATE TABLE AS statement
could cause a NULL pointer dereference, related to build.c and
prepare.c.
### References:
http://openwall.com/lists/oss-security/2018/03/17/1
https://nvd.nist.gov/vuln/detail/CVE-2018-8740
### Patch:
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
*(from redmine: issue id 8680, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8681
* copied_to #8682
* copied_to #8683
* copied_to #8684
* copied_to #8685
* child #8681
* child #8682
* child #8683
* child #8684
* child #8685Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8679[3.4] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)2019-07-23T11:34:04ZAlicha CH[3.4] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut...A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut some of the arg-sanitizing code. This vulnerability allows
remote attackers to
bypass the argument-sanitization protection mechanism, which may lead to
a privilege escalation vulnerability.
### Fixed In Version:
rsync 3.1.3
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
### Patch:
https://git.samba.org/rsync.git/?p=rsync.git;a=patch;h=7706303828fcde524222babb2833864a4bd09e07
*(from redmine: issue id 8679, created on 2018-03-19, closed on 2018-03-20)*
* Relations:
* copied_to #8675
* parent #8675
* Changesets:
* Revision 5210d540ebb8f27078881e69626388f6ff6a19d7 by Natanael Copa on 2018-03-20T12:24:27Z:
```
main/rsync: security upgrade to 3.1.3 (CVE-2018-5764)
fixes #8679
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8678[3.5] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)2019-07-23T11:34:05ZAlicha CH[3.5] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut...A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut some of the arg-sanitizing code. This vulnerability allows
remote attackers to
bypass the argument-sanitization protection mechanism, which may lead to
a privilege escalation vulnerability.
### Fixed In Version:
rsync 3.1.3
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
### Patch:
https://git.samba.org/rsync.git/?p=rsync.git;a=patch;h=7706303828fcde524222babb2833864a4bd09e07
*(from redmine: issue id 8678, created on 2018-03-19, closed on 2018-03-20)*
* Relations:
* copied_to #8675
* parent #8675
* Changesets:
* Revision 9cd8a524f060c689c2aaf6c3d204e66a073758f7 by Natanael Copa on 2018-03-20T12:20:00Z:
```
main/rsync: security upgrade to 3.1.3 (CVE-2018-5764)
fixes #8678
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8677[3.6] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)2019-07-23T11:34:06ZAlicha CH[3.6] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut...A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut some of the arg-sanitizing code. This vulnerability allows
remote attackers to
bypass the argument-sanitization protection mechanism, which may lead to
a privilege escalation vulnerability.
### Fixed In Version:
rsync 3.1.3
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
### Patch:
https://git.samba.org/rsync.git/?p=rsync.git;a=patch;h=7706303828fcde524222babb2833864a4bd09e07
*(from redmine: issue id 8677, created on 2018-03-19, closed on 2018-03-20)*
* Relations:
* copied_to #8675
* parent #8675
* Changesets:
* Revision 715507dc62229f9d5829b78732cae217c1b31865 by Natanael Copa on 2018-03-20T12:14:18Z:
```
main/rsync: security upgrade to 3.1.3 (CVE-2018-5764)
fixes #8677
```3.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8676[3.7] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)2019-07-23T11:34:07ZAlicha CH[3.7] rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut...A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut some of the arg-sanitizing code. This vulnerability allows
remote attackers to
bypass the argument-sanitization protection mechanism, which may lead to
a privilege escalation vulnerability.
### Fixed In Version:
rsync 3.1.3
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
### Patch:
https://git.samba.org/rsync.git/?p=rsync.git;a=patch;h=7706303828fcde524222babb2833864a4bd09e07
*(from redmine: issue id 8676, created on 2018-03-19, closed on 2018-03-20)*
* Relations:
* copied_to #8675
* parent #8675
* Changesets:
* Revision 4b0114024e6182993b944233c2e726395b599f7b by Natanael Copa on 2018-03-20T12:12:35Z:
```
main/rsync: security upgrade to 3.1.3 (CVE-2018-5764)
fixes #8676
```3.7.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8675rsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)2019-07-23T11:34:08ZAlicha CHrsync: sanitization bypass in parse_argument in options.c (CVE-2018-5764)A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut...A flaw was found in rsync verions before 3.1.3. The parse\_argument
function in options.c in rsyncd component does not prevent multiple
—protect-args uses.
Thus letting the user to specify the arg in the protected-arg list and
shortcut some of the arg-sanitizing code. This vulnerability allows
remote attackers to
bypass the argument-sanitization protection mechanism, which may lead to
a privilege escalation vulnerability.
### Fixed In Version:
rsync 3.1.3
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
### Patch:
https://git.samba.org/rsync.git/?p=rsync.git;a=patch;h=7706303828fcde524222babb2833864a4bd09e07
*(from redmine: issue id 8675, created on 2018-03-19, closed on 2018-03-20)*
* Relations:
* copied_to #8676
* copied_to #8677
* copied_to #8678
* copied_to #8679
* child #8676
* child #8677
* child #8678
* child #8679Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8674[3.4] libvorbis: out-of-bounds write (CVE-2018-5146)2019-07-23T11:34:09ZAlicha CH[3.4] libvorbis: out-of-bounds write (CVE-2018-5146)Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(fro...Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(from redmine: issue id 8674, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8669
* parent #86693.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8673[3.5] libvorbis: out-of-bounds write (CVE-2018-5146)2019-07-23T11:34:10ZAlicha CH[3.5] libvorbis: out-of-bounds write (CVE-2018-5146)Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(fro...Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(from redmine: issue id 8673, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8669
* parent #8669
* Changesets:
* Revision f77113ff5f50a2b6e8a207bae850994250dec650 on 2018-07-30T08:35:01Z:
```
main/libvorbis: upgrade to 1.3.6, enable tests
fixes #8673
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8672[3.6] libvorbis: out-of-bounds write (CVE-2018-5146)2019-07-23T11:34:12ZAlicha CH[3.6] libvorbis: out-of-bounds write (CVE-2018-5146)Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(fro...Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(from redmine: issue id 8672, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8669
* parent #8669
* Changesets:
* Revision d306aa6cfcff4a7559cb685f450de8970e6cc399 on 2018-07-30T08:28:24Z:
```
main/libvorbis: upgrade to 1.3.6, enable tests
fixes #8672
```3.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8671[3.7] libvorbis: out-of-bounds write (CVE-2018-5146)2020-01-18T00:12:52ZAlicha CH[3.7] libvorbis: out-of-bounds write (CVE-2018-5146)Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(fro...Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(from redmine: issue id 8671, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8669
* parent #8669
* Changesets:
* Revision 4c88d6e438038dd3f6edd42b97421d650984659a on 2018-07-30T08:21:40Z:
```
main/libvorbis: upgrade to 1.3.6, enable tests
fixes #8671
```3.7.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8670[3.8] libvorbis: out-of-bounds write (CVE-2018-5146)2019-07-23T11:34:14ZAlicha CH[3.8] libvorbis: out-of-bounds write (CVE-2018-5146)Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(fro...Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(from redmine: issue id 8670, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8669
* parent #8669
* Changesets:
* Revision e408a1ad1a359d037188ea51cc2b0aa052218846 on 2018-03-28T14:01:48Z:
```
main/libvorbis: upgrade to 1.3.6, enable tests
fixes #8670
```3.8.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8669libvorbis: out-of-bounds write (CVE-2018-5146)2019-07-23T11:34:15ZAlicha CHlibvorbis: out-of-bounds write (CVE-2018-5146)Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(fro...Write out of bounds when processing
malformed Vorbis audio data.
### Fixed In Version:
libvorbis 1.3.6
### References:
https://github.com/xiph/vorbis/releases/tag/v1.3.6
http://openwall.com/lists/oss-security/2018/03/16/4
*(from redmine: issue id 8669, created on 2018-03-19, closed on 2018-07-30)*
* Relations:
* copied_to #8670
* copied_to #8671
* copied_to #8672
* copied_to #8673
* copied_to #8674
* child #8670
* child #8671
* child #8672
* child #8673
* child #8674Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8668multiple interface with dhcp result into wrong metric and gateway2021-05-09T17:27:52Zalgitbotmultiple interface with dhcp result into wrong metric and gatewayI have 2 network interfaces, both are using DHCP, eth0 is for internet,
and eth1 is for lan only.
From the wiki: https://wiki.alpinelinux.org/wiki/Multi\_ISP
The DHCP client will automatically add a metric value to the default
gateway...I have 2 network interfaces, both are using DHCP, eth0 is for internet,
and eth1 is for lan only.
From the wiki: https://wiki.alpinelinux.org/wiki/Multi\_ISP
The DHCP client will automatically add a metric value to the default
gateway. It will pick 200 + interface index. Therefore we don’t need to
worry about that for DHCP.
But, ifconfig shows metric are both 1, so every time I reboot my system,
I have no internet.
The system will pick up the latest up interface as the default
gateway.
It is randomly unexpectable.
localhost:~# cat /etc/network/interfaces
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet dhcp
auto eth1
iface eth1 inet dhcp
localhost:~# netstat -nre
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.0.2.1 0.0.0.0 UG 202 0 0 eth0
10.0.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
192.168.56.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
localhost:~# ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:7B:1A:80
inet addr:10.0.2.4 Bcast:0.0.0.0 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fe7b:1a80/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2 errors:0 dropped:0 overruns:0 frame:0
TX packets:14 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1180 (1.1 KiB) TX bytes:1612 (1.5 KiB)
eth1 Link encap:Ethernet HWaddr 08:00:27:19:32:A2
inet addr:192.168.56.150 Bcast:0.0.0.0 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fe19:32a2/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:203 errors:0 dropped:0 overruns:0 frame:0
TX packets:133 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:22257 (21.7 KiB) TX bytes:30775 (30.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:40 errors:0 dropped:0 overruns:0 frame:0
TX packets:40 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1
RX bytes:2880 (2.8 KiB) TX bytes:2880 (2.8 KiB)
*(from redmine: issue id 8668, created on 2018-03-19)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8667Update openjdk8 to 8u161 to fix important CVEs2019-07-23T11:26:42ZalgitbotUpdate openjdk8 to 8u161 to fix important CVEsRed Hat has pushed their update to OpenJDK 8 and assigned the update
Important severity. [Red Hat
errata](https://access.redhat.com/errata/RHSA-2018:0095)
This also fixes minor bugs. [Red Hat
errata](https://access.redhat.com/errata/RH...Red Hat has pushed their update to OpenJDK 8 and assigned the update
Important severity. [Red Hat
errata](https://access.redhat.com/errata/RHSA-2018:0095)
This also fixes minor bugs. [Red Hat
errata](https://access.redhat.com/errata/RHBA-2017:3488)
*(from redmine: issue id 8667, created on 2018-03-19, closed on 2019-05-03)*Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8666openssl-dev-1.0.2n-r0 conflicts with libressl-dev-2.6.4-r02019-07-23T11:34:16Zalgitbotopenssl-dev-1.0.2n-r0 conflicts with libressl-dev-2.6.4-r0Hello,
When I try to install opusfile-dev, I get the following errors:
% sudo apk add opusfile-dev
ERROR: unsatisfiable constraints:
openssl-dev-1.0.2n-r0:
conflicts: libressl-dev-2.6.4-r0\[pc:libcrypto=1.0.2n\]
libressl-dev-2.6....Hello,
When I try to install opusfile-dev, I get the following errors:
% sudo apk add opusfile-dev
ERROR: unsatisfiable constraints:
openssl-dev-1.0.2n-r0:
conflicts: libressl-dev-2.6.4-r0\[pc:libcrypto=1.0.2n\]
libressl-dev-2.6.4-r0\[pc:libssl=1.0.2n\]
libressl-dev-2.6.4-r0\[pc:openssl=1.0.2n\]
satisfies: world\[openssl-dev\] opusfile-dev-0.10-r0\[pc:openssl\]
libressl-dev-2.6.4-r0:
conflicts: openssl-dev-1.0.2n-r0\[pc:libcrypto=2.6.4\]
openssl-dev-1.0.2n-r0\[pc:libssl=2.6.4\]
openssl-dev-1.0.2n-r0\[pc:openssl=2.6.4\]
satisfies: opusfile-dev-0.10-r0\[libressl-dev\]
opusfile-dev-0.10-r0\[pc:openssl\]
*(from redmine: issue id 8666, created on 2018-03-18, closed on 2019-05-04)*
* Changesets:
* Revision 56b7c96202fd05c73d55cac625c7f755cad353a5 by TBK . on 2018-07-19T11:07:15Z:
```
main/opusfile: fix dependency conflict
fixes #8666
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/8665shadow-doc package install error2019-07-23T11:34:17Zalgitbotshadow-doc package install errorWhen installing shadow-doc package, I get the following errors:
(1/1) Installing shadow-doc (4.5-r0)
ERROR: shadow-doc-4.5-r0: trying to overwrite
usr/share/man/man1/groups.1.gz owned by coreutils-doc-8.29-r2.
ERROR: shadow-doc-4.5-...When installing shadow-doc package, I get the following errors:
(1/1) Installing shadow-doc (4.5-r0)
ERROR: shadow-doc-4.5-r0: trying to overwrite
usr/share/man/man1/groups.1.gz owned by coreutils-doc-8.29-r2.
ERROR: shadow-doc-4.5-r0: trying to overwrite
usr/share/man/man8/nologin.8.gz owned by util-linux-doc-2.31-r0.
Executing mdocml-apropos-1.14.3-r0.trigger
1 error; 6441 MiB in 784 packages
*(from redmine: issue id 8665, created on 2018-03-18, closed on 2019-05-09)*
* Changesets:
* Revision e2b78d8aaecccd0111a10a016573f3f64c3b381a by Natanael Copa on 2019-05-06T09:18:20Z:
```
community/shadow: fix conflict with util-linux-doc and coreutils-doc
ref #8665
```
* Revision 51b2f7042f969031e9dcc7c557f96645977dbe22 by Natanael Copa on 2019-05-06T09:26:40Z:
```
community/shadow: fix conflict with util-linux-doc and coreutils-doc
fixes #8665
```3.9.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8664qt5 is getting out of date2019-07-23T11:34:18ZTaner Tasqt5 is getting out of dateqt5 is 5.10.1 for a month but we still on 5.9.3
qt5-multimedia must compile against actual gstreamer-1.1x series not
0.10.
*(from redmine: issue id 8664, created on 2018-03-18, closed on 2018-06-26)*qt5 is 5.10.1 for a month but we still on 5.9.3
qt5-multimedia must compile against actual gstreamer-1.1x series not
0.10.
*(from redmine: issue id 8664, created on 2018-03-18, closed on 2018-06-26)*3.8.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8663main/linux-firmware: Fails to download brcmfmac43430-sdio.{txt,bin}2019-07-23T11:34:19Zalgitbotmain/linux-firmware: Fails to download brcmfmac43430-sdio.{txt,bin}This affects at least linux-firmware-20180110-r0 (currently in
aports/master).
The URL
https://github.com/RPi-Distro/firmware-nonfree/raw/master/brcm80211/brcm/brcmfmac43430-sdio.txt
yields an HTTP 404.
I tried to find a commit in
http...This affects at least linux-firmware-20180110-r0 (currently in
aports/master).
The URL
https://github.com/RPi-Distro/firmware-nonfree/raw/master/brcm80211/brcm/brcmfmac43430-sdio.txt
yields an HTTP 404.
I tried to find a commit in
https://github.com/RPi-Distro/firmware-nonfree that contained
brcm80211/brcm/brcmfmac43430-sdio.txt (at that location), in order to
pin the URL to that commit instead of “master”, but couldn’t.
Possible solutions:
\- Update the BCM43430 firmware to a newer version from that repo.
\- Remove the BCM43430 firmware from linux-firmware, essentially
reverting commit 46edfde10d (“main/linux-firmware: update firmware for
rpi3 wifi”)
- Split the BCM43430 firmware into its own package (possibly under the
non-free/ directory), and update the firmware to avoid the 404.
Thanks for maintaining Alpine!
*(from redmine: issue id 8663, created on 2018-03-16, closed on 2019-05-03)*
* Changesets:
* Revision 779ee7a21ad5d88c16b8693bf144760b38e5c8ff by Natanael Copa on 2018-04-17T20:44:10Z:
```
main/linux-firmware: upgrade to 20180417
fixes #8663
```Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8662community/asio (-dev) (1.10.6-r1) - compile error - incorrect #include <sys/p...2019-07-23T11:34:20ZDaniel Blackcommunity/asio (-dev) (1.10.6-r1) - compile error - incorrect #include <sys/poll.h> to <poll.h>/ # apk add asio-dev
(1/3) Installing libressl2.6-libtls (2.6.3-r0)
(2/3) Installing libressl-dev (2.6.3-r0)
(3/3) Installing asio-dev (1.10.6-r1)
While compiling galera (after a few galera fixes)
In file included from.../ # apk add asio-dev
(1/3) Installing libressl2.6-libtls (2.6.3-r0)
(2/3) Installing libressl-dev (2.6.3-r0)
(3/3) Installing asio-dev (1.10.6-r1)
While compiling galera (after a few galera fixes)
In file included from /usr/include/asio/detail/socket_types.hpp:57:0,
from /usr/include/asio/impl/error_code.ipp:29,
from /usr/include/asio/error_code.hpp:185,
from /usr/include/asio/io_service.hpp:25,
from /usr/include/asio/basic_io_object.hpp:19,
from /usr/include/asio/basic_socket.hpp:20,
from /usr/include/asio/basic_datagram_socket.hpp:20,
from /usr/include/asio.hpp:19,
from galerautils/src/gu_asio.hpp:46,
from galera/src/ist.hpp:15,
from galera/src/ist.cpp:5:
/usr/include/sys/poll.h:1:2: error: #warning redirecting incorrect #include <sys/poll.h> to <poll.h> [-Werror=cpp]
#warning redirecting incorrect #include <sys/poll.h> to <poll.h>
Upstream has fixed this in
https://github.com/chriskohlhoff/asio/commit/5adce6e26769228f2c9fcc0b9dda8bf00279821f
though their (http://think-async.com/) stable release is still 1.10.6.
*(from redmine: issue id 8662, created on 2018-03-16, closed on 2018-06-25)*
* Changesets:
* Revision f5bcb24db9fdce08492af30dfb17e38b0f7b7269 by Natanael Copa on 2018-03-16T08:50:46Z:
```
community/asio: upgrade to 1.12.0
fixes #8662
```3.8.0Natanael CopaNatanael Copa