aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T14:19:21Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2210[v2.6] CVE-2013-4131 subversion: DoS (assertion failure, crash) in mod_dav_sv...2019-07-23T14:19:21ZPeter Kotcauer[v2.6] CVE-2013-4131 subversion: DoS (assertion failure, crash) in mod_dav_svn when handling certain MOVE, COPY, or DELETE HTTP requestsreference:
http://subversion.apache.org/security/CVE-2013-4131-advisory.txt
A vulnerability has been found and corrected in subversion:
The mod\_dav\_svn Apache HTTPD server module in Subversion 1.7.0
through
1.7.10 and 1.8.x befor...reference:
http://subversion.apache.org/security/CVE-2013-4131-advisory.txt
A vulnerability has been found and corrected in subversion:
The mod\_dav\_svn Apache HTTPD server module in Subversion 1.7.0
through
1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to
cause a denial of service (assertion failure or out-of-bounds read)
via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a
revision root (CVE-2013-4131).
*(from redmine: issue id 2210, created on 2013-08-06, closed on 2013-08-30)*
* Relations:
* parent #2209
* Changesets:
* Revision fd54afb73ceddcfe5bf190f8dd6acbc336fe180f by Natanael Copa on 2013-08-07T15:56:54Z:
```
main/subversion: security upgrade to 1.7.11 (CVE-2013-4131)
fixes #2210
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2205[v2.6] Multiple security issues in libtiff (CVE-2013-1960 , CVE-2013-1961)2019-07-23T14:19:26ZPeter Kotcauer[v2.6] Multiple security issues in libtiff (CVE-2013-1960 , CVE-2013-1961)references:
https://access.redhat.com/security/cve/CVE-2013-1960
https://access.redhat.com/security/cve/CVE-2013-1961
Two flaws were reported to us in tiff2pdf utility shipped with the
libtiff library. Details as follows:
1. CVE-...references:
https://access.redhat.com/security/cve/CVE-2013-1960
https://access.redhat.com/security/cve/CVE-2013-1961
Two flaws were reported to us in tiff2pdf utility shipped with the
libtiff library. Details as follows:
1. CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with
malformed image-length and resolution
A stack-based buffer overflow was found in the way tiff2pdf, a TIFF
image to a PDF document conversion tool, of libtiff, a library of
functions for manipulating TIFF (Tagged Image File Format) image
format
files, performed write of TIFF image content into particular PDF
document file, when malformed image-length and resolution values are
used in the TIFF file. A remote attacker could provide a specially-
crafted TIFF image format file, that when processed by tiff2pdf would
lead to tiff2pdf executable crash.
Reference: https://bugzilla.redhat.com/show\_bug.cgi?id=952131
2. CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in
t2\_process\_jpeg\_strip()
A heap-based buffer overflow flaw was found in the way tiff2pdf, a
TIFF
image to a PDF document conversion tool, of libtiff, a library of
functions for manipulating TIFF (Tagged Image File Format) image
format
files, performed write of TIFF image content into particular PDF
document file, in the tp\_process\_jpeg\_strip() function. A remote
attacker could provide a specially-crafted TIFF image format file,
that
when processed by tiff2pdf would lead to tiff2pdf executable crash or,
potentially, arbitrary code execution with the privileges of the user
running the tiff2pdf binary.
Reference: https://bugzilla.redhat.com/show\_bug.cgi?id=952158
*(from redmine: issue id 2205, created on 2013-08-06, closed on 2013-08-29)*
* Relations:
* parent #2203
* Changesets:
* Revision 844b74d92a894847d6c48a9ffd34f26e6f552051 by Natanael Copa on 2013-08-07T14:24:10Z:
```
main/tiff: sec fixes (CVE-2012-4447,CVE-2012-4564,CVE-2013-1960,CVE-2013-1961)
ref #2203
fixes #2205
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2196[v2.6] quagga: CVE-2013-2236, stack overrun in apiserver2019-07-23T14:19:33ZNatanael Copa[v2.6] quagga: CVE-2013-2236, stack overrun in apiserverhttp://nongnu.uib.no//quagga/quagga-0.99.22.3.changelog.txt
commit 3f872fe60463a931c5c766dbf8c36870c0023e88
Author: David Lamparter <equinox@opensourcerouting.org>
Date: Mon Jul 8 23:05:28 2013 +0200
ospfd: CVE-20...http://nongnu.uib.no//quagga/quagga-0.99.22.3.changelog.txt
commit 3f872fe60463a931c5c766dbf8c36870c0023e88
Author: David Lamparter <equinox@opensourcerouting.org>
Date: Mon Jul 8 23:05:28 2013 +0200
ospfd: CVE-2013-2236, stack overrun in apiserver
the OSPF API-server (exporting the LSDB and allowing announcement of
Opaque-LSAs) writes past the end of fixed on-stack buffers. This leads
to an exploitable stack overflow.
For this condition to occur, the following two conditions must be true:
- Quagga is configured with --enable-opaque-lsa
- ospfd is started with the "-a" command line option
If either of these does not hold, the relevant code is not executed and
the issue does not get triggered.
Since the issue occurs on receiving large LSAs (larger than 1488 bytes),
it is possible for this to happen during normal operation of a network.
In particular, if there is an OSPF router with a large number of
interfaces, the Router-LSA of that router may exceed 1488 bytes and
trigger this, leading to an ospfd crash.
For an attacker to exploit this, s/he must be able to inject valid LSAs
into the OSPF domain. Any best-practice protection measure (using
crypto authentication, restricting OSPF to internal interfaces, packet
filtering protocol 89, etc.) will prevent exploitation. On top of that,
remote (not on an OSPF-speaking network segment) attackers will have
difficulties bringing up the adjacency needed to inject a LSA.
This patch only performs minimal changes to remove the possibility of a
stack overrun. The OSPF API in general is quite ugly and needs a
rewrite.
Reported-by: Ricky Charlet <ricky.charlet@hp.com>
Cc: Florian Weimer <fweimer@redhat.com>
Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
*(from redmine: issue id 2196, created on 2013-08-06, closed on 2013-08-30)*
* Relations:
* parent #2195
* Changesets:
* Revision a28bace575d90d4480eb3d804ce109ea471ee7fa by Natanael Copa on 2013-08-06T15:10:40Z:
```
main/quagga: upgrade to 0.99.22.3
ref #2195
fixes #2196
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2188[v2.6] libgcrypt CVE-2013-4242 GnuPG susceptible to Yarom/Falkner flush+reloa...2019-07-23T14:19:39ZPeter Kotcauer[v2.6] libgcrypt CVE-2013-4242 GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attackreferences:
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
Libgcrypt version 1.5.3.
This is a **security fix** release for the stable branch.
...references:
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
Libgcrypt version 1.5.3.
This is a **security fix** release for the stable branch.
Libgcrypt is a general purpose library of cryptographic building
blocks. It is originally based on code used by GnuPG. It does not
provide any implementation of OpenPGP or other protocols. Thorough
understanding of applied cryptography is required to use Libgcrypt.
Noteworthy changes in version 1.5.3:
\* Mitigate the Yarom/Falkner flush+reload side-channel attack on
RSA secret keys. See <http://eprint.iacr.org/2013/448>.
\[ Note that Libgcrypt is used by GnuPG 2.x and thus this release
fixes
the above problem. The fix for GnuPG < 2.0 can be found in the just
released GnuPG 1.4.14. \]
Source code is hosted at the GnuPG FTP server and its mirrors as
listed at http://www.gnupg.org/download/mirrors.html . On the primary
server the source file and its digital signatures is:
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.bz2 (1.5M)
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.bz2.sig
This file is bzip2 compressed. A gzip compressed version is also
available:
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.gz (1.8M)
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.gz.sig
Alternativley you may upgrade version 1.5.2 using this patch file:
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.2-1.5.3.diff.bz2 (4k)
The SHA-1 checksums are:
2c6553cc17f2a1616d512d6870fe95edf6b0e26e libgcrypt-1.5.3.tar.bz2
184405c91d1ab4877caefb1a6458767e5f0b639e libgcrypt-1.5.3.tar.gz
b711fe3ddf534bb6f11823542036eb4a32e0c914 libgcrypt-1.5.2-1.5.3.diff.bz2
*(from redmine: issue id 2188, created on 2013-08-02, closed on 2013-08-06)*
* Relations:
* parent #2187
* Changesets:
* Revision b118fe90a7bc4d92a90c96ca681d9650d794ed44 by Natanael Copa on 2013-08-05T14:10:15Z:
```
main/libgcrypt: security upgrade to 1.5.3 (CVE-2013-4242)
ref #2187
fixes #2188
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2186Add new hs-esslingen mirror to Alpine 2.6.32019-07-23T14:19:41ZDennis PrzytarskiAdd new hs-esslingen mirror to Alpine 2.6.3*(from redmine: issue id 2186, created on 2013-08-01, closed on 2013-08-06)*
* Changesets:
* Revision e835f3bc398d4798219ed8f323efa9d772056382 by Natanael Copa on 2013-08-05T14:19:36Z:
```
main/alpine-mirrors: add hs-esslingen.de and...*(from redmine: issue id 2186, created on 2013-08-01, closed on 2013-08-06)*
* Changesets:
* Revision e835f3bc398d4798219ed8f323efa9d772056382 by Natanael Copa on 2013-08-05T14:19:36Z:
```
main/alpine-mirrors: add hs-esslingen.de and remove RELEASES.txt
fixes #2186
(cherry picked from commit 4f5484067fbc1d3de3fe75225fc74c80b6af9983)
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2185[v2.6] phpmyadmin several vulnerabilities2019-07-23T14:19:42ZPeter Kotcauer[v2.6] phpmyadmin several vulnerabilitiesreference:
http://www.openwall.com/lists/oss-security/2013/07/30/1
CVE-2013-4995
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-8.php
CVE-2013-4996 , CVE-2013-4997
http://www.phpmyadmin.net/home\_page/security/PMASA-201...reference:
http://www.openwall.com/lists/oss-security/2013/07/30/1
CVE-2013-4995
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-8.php
CVE-2013-4996 , CVE-2013-4997
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-9.php
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-11.php
CVE-2013-4998 , CVE-2013-4999 , CVE-2013-5000
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-12.php
CVE-2013-5001
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-13.php
CVE-2013-5002
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-14.php
CVE-2013-5003
http://www.phpmyadmin.net/home\_page/security/PMASA-2013-15.php
*(from redmine: issue id 2185, created on 2013-07-31, closed on 2013-08-02)*
* Relations:
* parent #2183
* Changesets:
* Revision 72a4a4de23734295243ff4446d7232862e889abd by Natanael Copa on 2013-08-02T08:10:25Z:
```
main/phpmyadmin: security upgrade to 4.0.4.2 (CVE-2013-4995,CVE-2013-4996,CVE-2013-4997,CVE-2013-4998,CVE-2013-4999,CVE-2013-5000,CVE-2013-5001,CVE-2013-5002,CVE-2013-5003)
ref #2183
fixes #2185
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2181[v2.6] wireshark: upgrade to 1.8.9. fixes various security vulnerabilities2019-07-23T14:19:46ZNatanael Copa[v2.6] wireshark: upgrade to 1.8.9. fixes various security vulnerabilitiesWhat’s New
Bug Fixes
The following vulnerabilities have been fixed.
\* \[1\]wnpa-sec-2013-41
The DCP ETSI dissector could crash. (\[2\]Bug 8717)
Versions affected: 1.10.0, 1.8.0 to 1.8.7
\[3\]CVE-2013-4083
\* \[4\]wnpa-sec-2...What’s New
Bug Fixes
The following vulnerabilities have been fixed.
\* \[1\]wnpa-sec-2013-41
The DCP ETSI dissector could crash. (\[2\]Bug 8717)
Versions affected: 1.10.0, 1.8.0 to 1.8.7
\[3\]CVE-2013-4083
\* \[4\]wnpa-sec-2013-42
The P1 dissector could crash. Discovered by Laurent Butti.
(\[5\]Bug 8826)
Versions affected: 1.10.0
\[6\]CVE-2013-4920
\* \[7\]wnpa-sec-2013-43
The Radiotap dissector could crash. Discovered by Laurent
Butti. (\[8\]Bug 8830)
Versions affected: 1.10.0
\[9\]CVE-2013-4921
\* \[10\]wnpa-sec-2013-44
The DCOM ISystemActivator dissector could crash. Discovered
by Laurent Butti. (\[11\]Bug 8828)
Versions affected: 1.10.0
\[12\]CVE-2013-4922 \[13\]CVE-2013-4923 \[14\]CVE-2013-4924
\[15\]CVE-2013-4925 \[16\]CVE-2013-4926
\* \[17\]wnpa-sec-2013-45
The Bluetooth SDP dissector could go into a large loop.
Discovered by Laurent Butti. (\[18\]Bug 8831)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[19\]CVE-2013-4927
\* \[20\]wnpa-sec-2013-46
The Bluetooth OBEX dissector could go into an infinite
loop. (\[21\]Bug 8875)
Versions affected: 1.10.0
\[22\]CVE-2013-4928
\* \[23\]wnpa-sec-2013-47
The DIS dissector could go into a large loop. (\[24\]Bug
8911)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[25\]CVE-2013-4929
\* \[26\]wnpa-sec-2013-48
The DVB-CI dissector could crash. Discovered by Laurent
Butti. (\[27\]Bug 8916)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[28\]CVE-2013-4930
\* \[29\]wnpa-sec-2013-49
The GSM RR dissector (and possibly others) could go into a
large loop. (\[30\]Bug 8923)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[31\]CVE-2013-4931
\* \[32\]wnpa-sec-2013-50
The GSM A Common dissector could crash. (\[33\]Bug 8940)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[34\]CVE-2013-4932
\* \[35\]wnpa-sec-2013-51
The Netmon file parser could crash. Discovered by G.
Geshev. (\[36\]Bug 8742)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[37\]CVE-2013-4933 \[38\]CVE-2013-4934
\* \[39\]wnpa-sec-2013-52
The ASN.1 PER dissector could crash. Discovered by
Oliver-Tobias Ripka. (\[40\]Bug 8722)
Versions affected: 1.10.0, 1.8.0 to 1.8.8
\[41\]CVE-2013-4935
\* \[42\]wnpa-sec-2013-53
The PROFINET Real-Time dissector could crash. (\[43\]Bug
8904)
Versions affected: 1.10.0
\[44\]CVE-2013-4936
http://www.wireshark.org/lists/wireshark-announce/201307/msg00000.html
*(from redmine: issue id 2181, created on 2013-07-29, closed on 2013-07-30)*
* Relations:
* parent #2179
* Changesets:
* Revision c0ed1cbff4a9a03fa3357dd28ab72109c3077fc7 by Natanael Copa on 2013-07-30T14:59:42Z:
```
main/wireshark: security upgrade to 1.8.9 (CVE-2013-4927,CVE-2013-4929,CVE-2013-4930,CVE-2013-4931,CVE-2013-4932,CVE-2013-4933,CVE-2013-4934,CVE-2013-4935)
ref #2179
fixes #2181
```Alpine 2.6.3https://gitlab.alpinelinux.org/alpine/aports/-/issues/2175[v2.6] bind: CVE-2013-4854: A specially crafted query can cause BIND to termi...2019-07-23T14:19:52ZNatanael Copa[v2.6] bind: CVE-2013-4854: A specially crafted query can cause BIND to terminate abnormallyCVE: CVE-2013-4854
Document Version: 2.0
Posting date: 26 July 2013
Program Impacted: BIND
Versions affected: 9.7.0<s><span style="text-align:right;">9.7.7,
9.8.0</span></s>&gt;9.8.5-P1, 9.9.0-&gt;9.9.3-P1, 9.8.6b1 and 9.9.4b1;
S...CVE: CVE-2013-4854
Document Version: 2.0
Posting date: 26 July 2013
Program Impacted: BIND
Versions affected: 9.7.0<s><span style="text-align:right;">9.7.7,
9.8.0</span></s>>9.8.5-P1, 9.9.0->9.9.3-P1, 9.8.6b1 and 9.9.4b1;
Subscription: 9.9.3-S1 and 9.9.4-S1b1
Severity: Critical
Exploitable: Remotely
### Description
A specially crafted query that includes malformed rdata can cause named
to terminate with an assertion failure while rejecting the malformed
query.
BIND 9.6 and BIND 9.6-ESV are unaffected by this problem. Earlier
branches of BIND 9 are believed to be unaffected but have not been
tested. BIND 10 is also unaffected by this issue.
Please Note: All versions of BIND 9.7 are known to be affected, but
these branches are beyond their “end of life” (EOL) and no longer
receive testing or security fixes from ISC. For current information on
which versions are actively supported, please see
http://www.isc.org/downloads/software-support-policy/bind-software-status/.
### Impact
Authoritative and recursive servers are equally vulnerable. Intentional
exploitation of this condition can cause a denial of service in all
nameservers running affected versions of BIND 9. Access Control Lists do
not provide any protection from malicious clients.
In addition to the named server, applications built using libraries from
the affected source distributions may crash with assertion failures
triggered in the same fashion.
CVSS Score: 7.8
CVSS Equation: (AV:N/AC:L/Au:N/C:N/I:N/A:C)
For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)
### Workarounds
No known workarounds at this time.
### Active exploits
Crashes have been reported by multiple ISC customers. First observed in
the wild on 26 July 2013.
*(from redmine: issue id 2175, created on 2013-07-29, closed on 2013-07-30)*
* Relations:
* parent #2173
* Changesets:
* Revision 4dbda03593fc0526f059db6d8397cf323105436f by Natanael Copa on 2013-07-29T08:23:18Z:
```
main/bind: security upgrade to 9.9.3_p2 (CVE-2013-4854)
fixes #2175
```Alpine 2.6.3https://gitlab.alpinelinux.org/alpine/aports/-/issues/2171/var/run/apache2 deleted each reboot, apache2 failed to start2019-07-23T14:19:56Zshaari sariban/var/run/apache2 deleted each reboot, apache2 failed to startfolder /var/run/apache2 deleted at reboot. This cause the following
error and apache failed to start.
\[Sat Jul 27 14:36:09.503626 2013\] \[suexec:notice\] \[pid 1733\]
AH01232: suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
\[S...folder /var/run/apache2 deleted at reboot. This cause the following
error and apache failed to start.
\[Sat Jul 27 14:36:09.503626 2013\] \[suexec:notice\] \[pid 1733\]
AH01232: suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
\[Sat Jul 27 14:36:09.551444 2013\] \[auth\_digest:notice\] \[pid 1734\]
AH01757: generating secret for digest authentication …
\[Sat Jul 27 14:36:09.551486 2013\] \[auth\_digest:error\] \[pid 1734\]
(2)No such file or directory: AH01762: Failed to create shared memory
segment on file /var/run/apache2/authdigest\_shm.1734
\[Sat Jul 27 14:36:09.551495 2013\] \[auth\_digest:error\] \[pid 1734\]
(2)No such file or directory: AH01760: failed to initialize shm - all
nonce-count checking, one-time nonces, and MD5-sess algorithm disabled
\[Sat Jul 27 14:36:09.551501 2013\] \[:emerg\] \[pid 1734\] AH00020:
Configuration Failed, exiting
zen86:~\# httpd -v
Server version: Apache/2.4.4 (Unix)
Server built: Jun 24 2013 07:50:35
The workaround for this to add mkdir /var/run/apache2 in the init file
*(from redmine: issue id 2171, created on 2013-07-27, closed on 2013-08-06)*
* Changesets:
* Revision fdf39794195592b4da31471a1485250fc132f143 by Natanael Copa on 2013-08-06T08:21:05Z:
```
main/apache2: create pid dir at startup. ignore missing conf.d/*.conf
ref #2171
```
* Revision de3901a821e4e6567c13cb005a2ed74b1b34bde1 by Natanael Copa on 2013-08-06T08:25:03Z:
```
main/apache2: create pid dir at startup. ignore missing conf.d/*.conf
fixes #2171
```Alpine 2.6.3https://gitlab.alpinelinux.org/alpine/aports/-/issues/2160[v2.6] CVE-2013-4130 spice: unsafe clients ring access abort2019-07-23T14:20:06ZPeter Kotcauer[v2.6] CVE-2013-4130 spice: unsafe clients ring access abortreference:
https://bugzilla.redhat.com/show\_bug.cgi?id=984769
*(from redmine: issue id 2160, created on 2013-07-18, closed on 2013-07-23)*
* Relations:
* parent #2159
* Changesets:
* Revision db7164f78513d312fe6acb5c1a76887a54b...reference:
https://bugzilla.redhat.com/show\_bug.cgi?id=984769
*(from redmine: issue id 2160, created on 2013-07-18, closed on 2013-07-23)*
* Relations:
* parent #2159
* Changesets:
* Revision db7164f78513d312fe6acb5c1a76887a54b09f4e by Natanael Copa on 2013-07-19T15:08:23Z:
```
main/spice: security upgrade to 0.12.4 (CVE-2013-4130)
ref #2159
fixes #2160
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2145[v2.6] CVE-2013-4127 kernel: vhost-net: use-after-free in vhost_net_flush2019-07-23T14:20:07ZPeter Kotcauer[v2.6] CVE-2013-4127 kernel: vhost-net: use-after-free in vhost_net_flushreference:
https://bugzilla.redhat.com/show\_bug.cgi?id=984722
vhost\_net\_ubuf\_put\_and\_wait has a confusing name: it will actually
also free it’s argument. vhost\_net\_flush tries to use the argument
after passing it to vhost\_net...reference:
https://bugzilla.redhat.com/show\_bug.cgi?id=984722
vhost\_net\_ubuf\_put\_and\_wait has a confusing name: it will actually
also free it’s argument. vhost\_net\_flush tries to use the argument
after passing it to vhost\_net\_ubuf\_put\_and\_wait, this results in
use after free.
Upstream fix:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd7633ecd553a5e304d349aa6f8eb8a0417098c5
Introduced by:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1280c27f8e29acf4af2da914e80ec27c3dbd5c01
Introduced in upstream version:
v3.8-rc1
*(from redmine: issue id 2145, created on 2013-07-18, closed on 2013-07-29)*
* Relations:
* parent #2144
* Changesets:
* Revision f206cc0c44e51172eca6222e9db00e2b89fb080f by Natanael Copa on 2013-07-25T10:38:42Z:
```
main/linux-grsec: various security fixes (CVE-2013-4125, CVE-2013-4127)
ref #2139 (CVE-2013-4125)
fixes #2140
ref #2144 (CVE-2013-4127)
fixes #2145
(cherry picked from commit 2090f6be2eb8aa04ae81c1bf456f4dc3709ac886)
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2140[v2.6]CVE-2013-4125 kernel: ipv6: BUG_ON in fib6_add_rt2node()2019-07-23T14:20:10ZPeter Kotcauer[v2.6]CVE-2013-4125 kernel: ipv6: BUG_ON in fib6_add_rt2node()references:
http://www.security-database.com/detail.php?alert=CVE-2013-4125
https://bugzilla.redhat.com/show\_bug.cgi?id=984664
*(from redmine: issue id 2140, created on 2013-07-18, closed on 2013-07-29)*
* Relations:
* parent #...references:
http://www.security-database.com/detail.php?alert=CVE-2013-4125
https://bugzilla.redhat.com/show\_bug.cgi?id=984664
*(from redmine: issue id 2140, created on 2013-07-18, closed on 2013-07-29)*
* Relations:
* parent #2139
* Changesets:
* Revision f206cc0c44e51172eca6222e9db00e2b89fb080f by Natanael Copa on 2013-07-25T10:38:42Z:
```
main/linux-grsec: various security fixes (CVE-2013-4125, CVE-2013-4127)
ref #2139 (CVE-2013-4125)
fixes #2140
ref #2144 (CVE-2013-4127)
fixes #2145
(cherry picked from commit 2090f6be2eb8aa04ae81c1bf456f4dc3709ac886)
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2086Bacula-FD needs a link to libxz2021-11-29T02:02:41ZFlorian HeiglBacula-FD needs a link to libxzBacula has support for two compression algorithms since version 5.2.
The choice of algorithm is done server-side with a setting like this:
Include {
Options {
\#compression = GZIP1
compression = LZO }
… stuff …
}
So the age...Bacula has support for two compression algorithms since version 5.2.
The choice of algorithm is done server-side with a setting like this:
Include {
Options {
\#compression = GZIP1
compression = LZO }
… stuff …
}
So the agent (if of 5.2+ version) is just told “how” and “if” to
compress and if it doesn’t the link to the specifc compression algorythm
it’ll just turn off compression.
As a result, you get bigger and possibly slower backups.
The bacula-fd package would need to depend on some of these:
:~\# apk search xz
xz-dev-5.0.4-r1
xz-doc-5.0.4-r1
xz-libs-5.0.4-r1
xz-5.0.4-r1
I suspect dev and libs are enough.
ldd
checking sub-depends for ‘/usr/lib/libbacfind-5.2.12.so’
checking sub-depends for ‘/usr/lib/libbacpy-5.2.12.so’
checking sub-depends for ‘/usr/lib/libbaccfg-5.2.12.so’
checking sub-depends for ‘/usr/lib/libbac-5.2.12.so’
checking sub-depends for ‘/lib/libz.so.1’
checking sub-depends for ‘/lib/libpthread.so.0.9.32’
checking sub-depends for ‘/lib/libc.so.0.9.32’
checking sub-depends for ‘/lib/libdl.so.0.9.32’
checking sub-depends for ‘/lib/libssl.so.1.0.0’
checking sub-depends for ‘/lib/libcrypto.so.1.0.0’
checking sub-depends for ‘/usr/lib/libstdc<span
class="underline"></span>.so.6’
checking sub-depends for ‘/lib/libm.so.0.9.32’
checking sub-depends for ‘/usr/lib/libgcc\_s.so.1’
checking sub-depends for ‘/lib/libubacktrace.so.0.9.32’
libbacfind-5.2.12.so =>/usr/lib/libbacfind-5.2.12.so (0x00000000)
libbacpy-5.2.12.so =>/usr/lib/libbacpy-5.2.12.so (0x00000000)
libbaccfg-5.2.12.so =>/usr/lib/libbaccfg-5.2.12.so (0x00000000)
libbac-5.2.12.so =>/usr/lib/libbac-5.2.12.so (0x00000000)
libz.so.1 =>/lib/libz.so.1 (0x00000000)
libpthread.so.0.9.32 =>/lib/libpthread.so.0.9.32 (0x00000000)
libc.so.0.9.32 =>/lib/libc.so.0.9.32 (0x00000000)
libdl.so.0.9.32 =>/lib/libdl.so.0.9.32 (0x00000000)
libssl.so.1.0.0 =>/lib/libssl.so.1.0.0 (0x00000000)
libcrypto.so.1.0.0 =>/lib/libcrypto.so.1.0.0 (0x00000000)
libstdc<span class="underline"></span>.so.6 =>/usr/lib/libstdc<span
class="underline"></span>.so.6 (0x00000000)
libm.so.0.9.32 =>/lib/libm.so.0.9.32 (0x00000000)
libgcc\_s.so.1 =>/usr/lib/libgcc\_s.so.1 (0x00000000)
libubacktrace.so.0.9.32 =>/lib/libubacktrace.so.0.9.32
(0x00000000)
ld64-uClibc.so.0.9.32 =>ld64-uClibc.so.0.9.32 (0x00000000)
ld64-uClibc.so.0.9.32 =>ld64-uClibc.so.0.9.32 (0x00000000)
*(from redmine: issue id 2086, created on 2013-06-13, closed on 2013-07-03)*
* Changesets:
* Revision 8ffcd2e1271f9baf1831f8568df75d977e173073 by Carlo Landmeter on 2013-06-17T13:42:26Z:
```
main/bacula: add lzo support
fixes #2086
```
* Revision af657d90a1ff1118c8be76209ad3baeb078971b0 by Carlo Landmeter on 2013-07-03T08:26:03Z:
```
main/bacula: add lzo support
fixes #2086
(cherry picked from commit 8ffcd2e1271f9baf1831f8568df75d977e173073)
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2071usb keyboard does not work in emergency console2019-07-23T14:21:14ZCarlo Landmeterusb keyboard does not work in emergency consoleI made a diff of lsmod when plugging in the keyboard. dmesg also
included.
PS this install has udev running.
@@ -1,4 +1,8 @@
Module Size Used by Not tainted
+hid_generic 1188 0
+usbhi...I made a diff of lsmod when plugging in the keyboard. dmesg also
included.
PS this install has udev running.
@@ -1,4 +1,8 @@
Module Size Used by Not tainted
+hid_generic 1188 0
+usbhid 29506 0
+hid 84338 2 hid_generic,usbhid
+usbkbd 4460 0
ipv6 290957 20
af_packet 26467 0
fbcon 34076 70
@@ -94,7 +98,7 @@
pata_acpi 3286 0
libata 180626 3 ata_generic,ata_piix,pata_acpi
usb_storage 48293 2 ums_realtek
-usbcore 161029 7 btusb,ums_realtek,uvcvideo,ehci_pci,ehci_hcd,uhci_hcd,usb_storage
+usbcore 161029 9 usbhid,usbkbd,btusb,ums_realtek,uvcvideo,ehci_pci,ehci_hcd,uhci_hcd,usb_storage
usb_common 1037 1 usbcore
sd_mod 26613 2
scsi_mod 108736 4 sr_mod,libata,usb_storage,sd_mod
[ 1.232354] sr 1:0:0:0: Attached scsi CD-ROM sr0
[ 1.303355] tsc: Refined TSC clocksource calibration: 1995.224 MHz
[ 1.303363] Switching to clocksource tsc
[ 1.453349] usb 7-1: new high-speed USB device number 2 using ehci-pci
[ 1.827375] usb 7-1: New USB device found, idVendor=0bda, idProduct=0158
[ 1.827379] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 1.827381] usb 7-1: Product: USB2.0-CRW
[ 1.827384] usb 7-1: Manufacturer: Generic
[ 1.827387] usb 7-1: SerialNumber: 20071114173400000
[ 2.193348] usb 7-4: new high-speed USB device number 4 using ehci-pci
[ 2.337627] usb 7-4: New USB device found, idVendor=0408, idProduct=20ba
[ 2.337632] usb 7-4: New USB device strings: Mfr=2, Product=1, SerialNumber=0
[ 2.337635] usb 7-4: Product: USB Webcam
[ 2.337638] usb 7-4: Manufacturer: SN001
[ 2.446682] usb 8-2: new high-speed USB device number 2 using ehci-pci
[ 2.505782] ehci-pci 0000:00:1d.7: port 2 reset error -110
[ 2.506676] ehci-pci 0000:00:1d.7: port 2 reset error -110
[ 2.510664] ehci-pci 0000:00:1d.7: port 2 reset error -110
[ 2.513108] ehci-pci 0000:00:1d.7: port 2 reset error -110
[ 2.514002] ehci-pci 0000:00:1d.7: port 2 reset error -110
[ 2.515554] hub 8-0:1.0: hub_port_status failed (err = -32)
[ 2.716694] hub 8-0:1.0: unable to enumerate USB device on port 2
[ 3.073345] usb 2-1: new full-speed USB device number 2 using uhci_hcd
[ 3.235660] usb 2-1: New USB device found, idVendor=18e8, idProduct=6252
[ 3.235664] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 3.235667] usb 2-1: Product: Broadcom Bluetooth USB
[ 3.235670] usb 2-1: Manufacturer: Broadcom Corp
[ 3.586679] usb 3-2: new full-speed USB device number 2 using uhci_hcd
[ 3.720702] usb 3-2: not running at top speed; connect to a high speed hub
[ 3.748700] usb 3-2: New USB device found, idVendor=14cd, idProduct=121c
[ 3.748704] usb 3-2: New USB device strings: Mfr=1, Product=3, SerialNumber=2
[ 3.748707] usb 3-2: Product: Mass Storage Device
[ 3.748709] usb 3-2: Manufacturer: Generic
[ 3.748712] usb 3-2: SerialNumber: 812320100708
[ 3.753368] scsi4 : usb-storage 3-2:1.0
[ 4.838733] scsi 4:0:0:0: Direct-Access USB Mass Storage Device PQ: 0 ANSI: 0 CCS
[ 4.850742] sd 4:0:0:0: [sdb] Attached SCSI removable disk
[ 4.984743] sd 4:0:0:0: [sdb] 7716864 512-byte logical blocks: (3.95 GB/3.67 GiB)
[ 4.990716] sd 4:0:0:0: [sdb] No Caching mode page present
[ 4.990721] sd 4:0:0:0: [sdb] Assuming drive cache: write through
[ 5.006711] sd 4:0:0:0: [sdb] No Caching mode page present
[ 5.006714] sd 4:0:0:0: [sdb] Assuming drive cache: write through
[ 5.012717] sdb: sdb1
[ 5.260729] FAT-fs (sdb1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive!
[ 193.869329] udevd[1102]: starting version 175
[ 195.423372] ACPI: Deprecated procfs I/F for AC is loaded, please retry with CONFIG_ACPI_PROCFS_POWER cleared
[ 195.423686] ACPI: AC Adapter [ACAD] (on-line)
[ 195.543435] ACPI: Requesting acpi_cpufreq
[ 195.543747] Monitor-Mwait will be used to enter C-1 state
[ 195.543755] Monitor-Mwait will be used to enter C-2 state
[ 195.543760] Monitor-Mwait will be used to enter C-3 state
[ 195.543764] tsc: Marking TSC unstable due to TSC halts in idle
[ 195.543778] ACPI: acpi_idle registered with cpuidle
[ 195.544182] Switching to clocksource hpet
[ 195.622150] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1
[ 195.622159] ACPI: Power Button [PWRB]
[ 195.622220] input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0D:00/input/input2
[ 195.630054] ACPI: Lid Switch [LID0]
[ 195.630138] input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input3
[ 195.630145] ACPI: Sleep Button [SLPB]
[ 195.630231] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4
[ 195.630234] ACPI: Power Button [PWRF]
[ 195.694996] thermal LNXTHERM:00: registered as thermal_zone0
[ 195.695000] ACPI: Thermal Zone [TZ01] (76 C)
[ 195.935928] acpi device:07: registered as cooling_device2
[ 195.935959] ACPI: Video Device [VGA] (multi-head: yes rom: no post: no)
[ 195.936016] input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:05/LNXVIDEO:01/input/input5
[ 195.974162] ACPI: Deprecated procfs I/F for battery is loaded, please retry with CONFIG_ACPI_PROCFS_POWER cleared
[ 195.974172] ACPI: Battery Slot [BAT0] (battery present)
[ 196.438951] wmi: Mapper loaded
[ 196.749704] Linux agpgart interface v0.103
[ 196.868938] [drm] Initialized drm 1.1.0 20060810
[ 197.464399] nouveau [ DEVICE][0000:01:00.0] BOOT0 : 0x298480a2
[ 197.464405] nouveau [ DEVICE][0000:01:00.0] Chipset: G98 (NV98)
[ 197.464407] nouveau [ DEVICE][0000:01:00.0] Family : NV50
[ 197.465960] nouveau [ VBIOS][0000:01:00.0] checking PRAMIN for image...
[ 197.557284] nouveau [ VBIOS][0000:01:00.0] ... appears to be valid
[ 197.557288] nouveau [ VBIOS][0000:01:00.0] using image from PRAMIN
[ 197.557543] nouveau [ VBIOS][0000:01:00.0] BIT signature found
[ 197.557546] nouveau [ VBIOS][0000:01:00.0] version 62.98.4e.00.33
[ 197.577827] nouveau [ PFB][0000:01:00.0] RAM type: DDR2
[ 197.577831] nouveau [ PFB][0000:01:00.0] RAM size: 256 MiB
[ 197.577834] nouveau [ PFB][0000:01:00.0] ZCOMP: 960 tags
[ 197.603765] nouveau [ PTHERM][0000:01:00.0] FAN control: none / external
[ 197.603776] nouveau [ PTHERM][0000:01:00.0] fan management: disabled
[ 197.603787] nouveau [ PTHERM][0000:01:00.0] internal sensor: yes
[ 197.603792] nouveau [ PTHERM][0000:01:00.0] Programmed thresholds [ 90(3), 95(3), 105(2), 110(5) ]
[ 197.604010] [TTM] Zone kernel: Available graphics memory: 1025786 kiB
[ 197.604012] [TTM] Initializing pool allocator
[ 197.604020] [TTM] Initializing DMA pool allocator
[ 197.604717] nouveau [ DRM] VRAM: 256 MiB
[ 197.604722] nouveau [ DRM] GART: 512 MiB
[ 197.604728] nouveau [ DRM] TMDS table version 2.0
[ 197.604731] nouveau [ DRM] DCB version 4.0
[ 197.604734] nouveau [ DRM] DCB outp 00: 01000323 00010034
[ 197.604737] nouveau [ DRM] DCB outp 01: 02014300 00000028
[ 197.604740] nouveau [ DRM] DCB outp 02: 02021332 00020010
[ 197.604742] nouveau [ DRM] DCB conn 00: 00000340
[ 197.604745] nouveau [ DRM] DCB conn 01: 00001061
[ 197.604748] nouveau [ DRM] DCB conn 02: 00000147
[ 197.604750] nouveau [ DRM] DCB conn 03: 00002131
[ 197.604753] nouveau [ DRM] DCB conn 04: 00000400
[ 197.604755] nouveau [ DRM] DCB conn 05: 00000210
[ 197.604757] nouveau [ DRM] DCB conn 06: 00000211
[ 197.604760] nouveau [ DRM] DCB conn 07: 00000213
[ 197.623400] [drm] Supports vblank timestamp caching Rev 1 (10.10.2010).
[ 197.623403] [drm] No driver support for vblank timestamp query.
[ 197.623407] nouveau [ DRM] ACPI backlight interface available, not registering our own
[ 197.623555] nouveau [ DRM] 4 available performance level(s)
[ 197.623560] nouveau [ DRM] 0: core 169MHz shader 338MHz memory 100MHz voltage 900mV fanspeed 100%
[ 197.623564] nouveau [ DRM] 1: core 275MHz shader 550MHz memory 250MHz voltage 900mV fanspeed 100%
[ 197.623569] nouveau [ DRM] 2: core 500MHz shader 1000MHz memory 400MHz voltage 1090mV fanspeed 100%
[ 197.623573] nouveau [ DRM] 3: core 580MHz shader 1450MHz memory 400MHz voltage 1170mV fanspeed 100%
[ 197.623578] nouveau [ DRM] c: core 275MHz shader 550MHz memory 249MHz voltage 1090mV
[ 197.648999] nouveau [ DRM] MM: using M2MF for buffer copies
[ 197.695109] nouveau [ DRM] allocated 1280x800 fb: 0x60000, bo ffff88007b876800
[ 197.695212] nouveau 0000:01:00.0: fb0: nouveaufb frame buffer device
[ 197.695215] nouveau 0000:01:00.0: registered panic notifier
[ 197.695220] [drm] Initialized nouveau 1.1.0 20120801 for 0000:01:00.0 on minor 0
[ 197.882352] r8169 Gigabit Ethernet driver 2.3LK-NAPI loaded
[ 197.882721] r8169 0000:05:00.0: irq 44 for MSI/MSI-X
[ 197.882881] r8169 0000:05:00.0 eth0: RTL8102e at 0xffffc9000463a000, 00:1e:68:f2:c9:67, XID 14a00000 IRQ 44
[ 197.970997] ACPI Warning: 0x0000000000000428-0x000000000000042f SystemIO conflicts with Region \PMBA 1 (20130117/utaddress-251)
[ 197.971005] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver
[ 197.971009] ACPI Warning: 0x0000000000000530-0x000000000000053f SystemIO conflicts with Region \GPIO 1 (20130117/utaddress-251)
[ 197.971014] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver
[ 197.971016] ACPI Warning: 0x0000000000000500-0x000000000000052f SystemIO conflicts with Region \GPIO 1 (20130117/utaddress-251)
[ 197.971021] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver
[ 197.971023] lpc_ich: Resource conflict(s) found affecting gpio_ich
[ 197.976788] i801_smbus 0000:00:1f.3: SMBus using PCI Interrupt
[ 198.492325] iTCO_vendor_support: vendor-support=0
[ 198.492655] iTCO_wdt: Intel TCO WatchDog Timer Driver v1.10
[ 198.492695] iTCO_wdt: Found a ICH9M TCO device (Version=2, TCOBASE=0x0460)
[ 198.492826] iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
[ 199.036382] snd_hda_intel 0000:00:1b.0: irq 45 for MSI/MSI-X
[ 199.286243] input: HDA Intel HDMI/DP,pcm=3 Phantom as /devices/pci0000:00/0000:00:1b.0/sound/card0/input6
[ 199.286397] input: HDA Intel Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input7
[ 199.286471] input: HDA Intel Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card0/input8
[ 199.361386] pci_hotplug: PCI Hot Plug PCI Core version: 0.5
[ 199.426856] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
[ 199.691853] cfg80211: Calling CRDA to update world regulatory domain
[ 199.878065] Intel(R) Wireless WiFi driver for Linux, in-tree:
[ 199.878070] Copyright(c) 2003-2013 Intel Corporation
[ 199.878375] iwlwifi 0000:02:00.0: irq 46 for MSI/MSI-X
[ 199.884544] input: PC Speaker as /devices/platform/pcspkr/input/input9
[ 200.190782] iwlwifi 0000:02:00.0: loaded firmware version 8.83.5.1 build 33692
[ 200.754376] media: Linux media interface: v0.10
[ 201.018292] Linux video capture interface: v2.00
[ 201.142146] iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEBUG disabled
[ 201.142151] iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEBUGFS disabled
[ 201.142154] iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEVICE_TRACING disabled
[ 201.142157] iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEVICE_TESTMODE disabled
[ 201.142160] iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_P2P disabled
[ 201.142163] iwlwifi 0000:02:00.0: Detected Intel(R) WiFi Link 5100 AGN, REV=0x54
[ 201.142193] iwlwifi 0000:02:00.0: L1 Disabled; Enabling L0S
[ 201.148025] uvcvideo: Found UVC 1.00 device USB Webcam (0408:20ba)
[ 201.148075] psmouse serio1: synaptics: Touchpad model: 1, fw: 6.5, id: 0x1c0b1, caps: 0xa04751/0xa00000/0x0, board id: 3655, fw id: 428212
[ 201.154215] input: USB Webcam as /devices/pci0000:00/0000:00:1a.7/usb7/7-4/7-4:1.0/input/input10
[ 201.160705] usbcore: registered new interface driver uvcvideo
[ 201.160709] USB Video Class driver (1.1.1)
[ 201.220615] input: SynPS/2 Synaptics TouchPad as /devices/platform/i8042/serio1/input/input11
[ 201.275663] scsi5 : usb-storage 7-1:1.0
[ 201.275748] usbcore: registered new interface driver ums-realtek
[ 201.418892] ieee80211 phy0: Selected rate control algorithm 'iwl-agn-rs'
[ 201.588411] mousedev: PS/2 mouse device common for all mice
[ 201.876219] Bluetooth: Core ver 2.16
[ 201.876248] NET: Registered protocol family 31
[ 201.876250] Bluetooth: HCI device and connection manager initialized
[ 201.876261] Bluetooth: HCI socket layer initialized
[ 201.876265] Bluetooth: L2CAP socket layer initialized
[ 201.876273] Bluetooth: SCO socket layer initialized
[ 201.939287] usbcore: registered new interface driver btusb
[ 202.278929] scsi 5:0:0:0: Direct-Access Generic- Multi-Card 1.00 PQ: 0 ANSI: 0 CCS
[ 202.284427] sd 5:0:0:0: [sdc] Attached SCSI removable disk
[ 203.481130] Console: switching to colour frame buffer device 160x50
[ 203.575354] NET: Registered protocol family 17
[ 203.592794] grsec: time set by /bin/busybox[hwclock:1396] uid/euid:0/0 gid/egid:0/0, parent /lib/rc/sh/runscript.sh[runscript.sh:1387] uid/euid:0/0 gid/egid:0/0
[ 203.781198] r8169 0000:05:00.0 eth0: link down
[ 203.781235] r8169 0000:05:00.0 eth0: link down
[ 205.373816] r8169 0000:05:00.0 eth0: link up
[ 211.162428] NET: Registered protocol family 10
[ 239.573346] usb 3-1: new low-speed USB device number 3 using uhci_hcd
[ 239.839828] usb 3-1: New USB device found, idVendor=046e, idProduct=52c1
[ 239.839832] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 239.839835] usb 3-1: Product: USB Multimedia Keyboard
[ 239.839838] usb 3-1: Manufacturer: BTC
[ 240.015216] input: BTC USB Multimedia Keyboard as /devices/pci0000:00/0000:00:1d.0/usb3/3-1/3-1:1.0/input/input12
[ 240.015328] usbcore: registered new interface driver usbkbd
[ 240.017378] hidraw: raw HID events driver (C) Jiri Kosina
[ 240.134903] usbcore: registered new interface driver usbhid
[ 240.134906] usbhid: USB HID core driver
[ 240.207904] input: BTC USB Multimedia Keyboard as /devices/pci0000:00/0000:00:1d.0/usb3/3-1/3-1:1.1/input/input13
[ 240.208037] hid-generic 0003:046E:52C1.0001: input,hiddev0,hidraw0: USB HID v1.10 Device [BTC USB Multimedia Keyboard] on usb-0000:00:1d.0-1/input1
*(from redmine: issue id 2071, created on 2013-06-06, closed on 2013-08-07)*
* Changesets:
* Revision 79fd28fa96d12a25831ef7761d58c633ab9cb727 by Natanael Copa on 2013-08-07T08:40:02Z:
```
main/busybox-initscripts: fix module autoloading
ref #2071
```
* Revision 1747953569f36106c1f30207067c466154ede6d4 by Natanael Copa on 2013-08-07T08:40:49Z:
```
main/mkinitfs: add hid-generic driver to fix usb keyboards
ref #2071
```
* Revision 28da60a05e96fa74584fbff529639bab30833353 by Natanael Copa on 2013-08-07T13:36:38Z:
```
main/busybox-initscripts: fix module autoloading
ref #2071
(cherry picked from commit 79fd28fa96d12a25831ef7761d58c633ab9cb727)
```
* Revision f0b476449f4f3d020cd0217348604352264c9d6c by Natanael Copa on 2013-08-07T13:37:00Z:
```
main/mkinitfs: upgrade to 2.5.0
fixes #2071
```Alpine 2.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2064userskins link invalid2019-07-23T14:21:22ZJan-Hendrik Dörneruserskins link invalidAfter a normal setup I see a symbolic link from
/usr/shar/acf/www/userskins to /etc/acf/skins, but this directory does
not exist.
(I think I saw this bug in pre 2.6.0 versions as well.)
*(from redmine: issue id 2064, created on 2013-...After a normal setup I see a symbolic link from
/usr/shar/acf/www/userskins to /etc/acf/skins, but this directory does
not exist.
(I think I saw this bug in pre 2.6.0 versions as well.)
*(from redmine: issue id 2064, created on 2013-06-04, closed on 2013-08-06)*
* Changesets:
* Revision 1ffa83ee5db171b8e38ce7b3ef187565c8e11b54 by Natanael Copa on 2013-07-03T08:33:32Z:
```
main/acf-core: create /etc/acf/skins directory
ref #2064
```
* Revision 077f36e3ecdfe1b065d4a496b78875e1dec773c3 by Natanael Copa on 2013-07-11T13:54:23Z:
```
main/acf-core: create /etc/acf/skins directory
fixes #2064
```
* Revision ffba227d985b7eb50bb5e1828459e91e27d00773 by Natanael Copa on 2013-08-28T08:12:29Z:
```
main/acf-core: create /etc/acf/skins directory
ref #2064
(cherry picked from commit 1ffa83ee5db171b8e38ce7b3ef187565c8e11b54)
```Alpine 2.6.3Ted TraskTed Trask2013-08-05