alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T13:43:37Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4936[3.3] nodejs: multiple issues (CVE-2015-6764, CVE-2015-8027)2019-07-23T13:43:37ZAlicha CH[3.3] nodejs: multiple issues (CVE-2015-6764, CVE-2015-8027)### CVE-2015-8027: a high-impact denial of service vulnerability
A bug exists in Node.js, all versions of v0.12.x through to v5.x
inclusive, whereby an external
attacker can cause a denial of service. The severity of this issue is
hig...### CVE-2015-8027: a high-impact denial of service vulnerability
A bug exists in Node.js, all versions of v0.12.x through to v5.x
inclusive, whereby an external
attacker can cause a denial of service. The severity of this issue is
high (see CVSS scoring below)
and users of the affected versions should plan to upgrade when a fix is
made available.
Versions 0.10.x of Node.js are not affected.
Versions **0.12.x** of Node.js are vulnerable.
Versions **4.x**, including LTS Argon, of Node.js are vulnerable.
Versions **5.x** of Node.js are vulnerable.
### CVE-2015-6764: a low-impact V8 out-of-bounds access vulnerability
An additional bug exists in Node.js, all versions of v4.x and v5.x,
whereby an attacker may be able to trigger an out-of-bounds access
and/or denial of service if user-supplied JavaScript can be executed by
an application. The severity of this issue is considered medium for
Node.js users (see CVSS scoring below), but only under circumstances
where an attacker may cause user-supplied JavaScript to be executed
within a Node.js application. Fixes will be shipped for the v4.x and
v5.x release lines along with fixes for CVE-2015-8027.
Versions 0.10.x of Node.js are not affected.
Versions 0.12.x of Node.js are not affected.
Versions **4.x**, including LTS Argon, of Node.js are vulnerable.
Versions **5.x** of Node.js are vulnerable.
### References:
https://nodejs.org/en/blog/vulnerability/december-2015-security-releases/
https://nodejs.org/en/blog/vulnerability/cve-2015-8027\_cve-2015-6764/
*(from redmine: issue id 4936, created on 2015-12-08, closed on 2015-12-09)*
* Relations:
* parent #4935
* Changesets:
* Revision f678033759637af9f55151d32f2203ea41c7de9a on 2015-12-09T15:22:16Z:
```
main/nodejs: security upgrade to 4.2.3 (CVE-2015-8027,CVE-2015-6764). Fixes #4936
```3.3.0Eivind UggedalEivind Uggedalhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4935nodejs: multiple issues (CVE-2015-6764 CVE-2015-8027)2019-07-23T13:43:38ZAlicha CHnodejs: multiple issues (CVE-2015-6764 CVE-2015-8027)### CVE-2015-8027: a high-impact denial of service vulnerability
A bug exists in Node.js, all versions of v0.12.x through to v5.x
inclusive, whereby an external
attacker can cause a denial of service. The severity of this issue is
hig...### CVE-2015-8027: a high-impact denial of service vulnerability
A bug exists in Node.js, all versions of v0.12.x through to v5.x
inclusive, whereby an external
attacker can cause a denial of service. The severity of this issue is
high (see CVSS scoring below)
and users of the affected versions should plan to upgrade when a fix is
made available.
Versions 0.10.x of Node.js are not affected.
Versions **0.12.x** of Node.js are vulnerable.
Versions **4.x**, including LTS Argon, of Node.js are vulnerable.
Versions **5.x** of Node.js are vulnerable.
### CVE-2015-6764: a low-impact V8 out-of-bounds access vulnerability
An additional bug exists in Node.js, all versions of v4.x and v5.x,
whereby an attacker may be able to trigger an out-of-bounds access
and/or denial of service if user-supplied JavaScript can be executed by
an application. The severity of this issue is considered medium for
Node.js users (see CVSS scoring below), but only under circumstances
where an attacker may cause user-supplied JavaScript to be executed
within a Node.js application. Fixes will be shipped for the v4.x and
v5.x release lines along with fixes for CVE-2015-8027.
Versions 0.10.x of Node.js are not affected.
Versions 0.12.x of Node.js are not affected.
Versions **4.x**, including LTS Argon, of Node.js are vulnerable.
Versions **5.x** of Node.js are vulnerable.
### References:
https://nodejs.org/en/blog/vulnerability/december-2015-security-releases/
https://nodejs.org/en/blog/vulnerability/cve-2015-8027\_cve-2015-6764/
*(from redmine: issue id 4935, created on 2015-12-08, closed on 2015-12-09)*
* Relations:
* child #4936
* child #4937Eivind UggedalEivind Uggedalhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4934Package request: xmlstarlet2019-07-23T13:43:39ZPrzemysław PawełczykPackage request: xmlstarletXMLStarlet is a set of command line utilities (tools) which can be used
to transform, query, validate, and edit XML documents and files using
simple set of shell commands in similar way it is done for plain text
files using UNIX grep, se...XMLStarlet is a set of command line utilities (tools) which can be used
to transform, query, validate, and edit XML documents and files using
simple set of shell commands in similar way it is done for plain text
files using UNIX grep, sed, awk, diff, patch, join, etc commands.
Home page: http://xmlstar.sourceforge.net/
Version:
[1.6.1](http://sourceforge.net/p/xmlstar/code/ci/master/tree/NEWS)
\[2014-08-09\]
Source:
http://sourceforge.net/projects/xmlstar/files/xmlstarlet/1.6.1/xmlstarlet-1.6.1.tar.gz/download
*(from redmine: issue id 4934, created on 2015-12-06, closed on 2015-12-18)*
* Changesets:
* Revision 2566377b7a5e650c109a6535a55e02a9d572a256 on 2015-12-15T21:42:25Z:
```
testing/xmlstarlet: new aport. Fixes #4934
```3.3.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/4933Package request: html-xml-utils2019-07-23T13:43:40ZPrzemysław PawełczykPackage request: html-xml-utilsA number of simple utilities for manipulating HTML and XML files.
Home page: http://www.w3.org/Tools/HTML-XML-utils/
Version: [6.9](http://www.w3.org/Tools/HTML-XML-utils/ChangeLog)
\[2014-10-21\]
Source: http://www.w3.org/Tools/HTM...A number of simple utilities for manipulating HTML and XML files.
Home page: http://www.w3.org/Tools/HTML-XML-utils/
Version: [6.9](http://www.w3.org/Tools/HTML-XML-utils/ChangeLog)
\[2014-10-21\]
Source: http://www.w3.org/Tools/HTML-XML-utils/html-xml-utils-6.9.tar.gz
*(from redmine: issue id 4933, created on 2015-12-06, closed on 2015-12-18)*
* Changesets:
* Revision 11810c91c0a74a290242c06ab40318cea1d87325 on 2015-12-15T22:12:04Z:
```
testing/html-xml-utils: new aport. Fixes #4933
```3.3.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/4932[3.0] cups-filters: foomatic-rip did not consider the back tick as an illegal...2019-07-23T13:43:41ZAlicha CH[3.0] cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character (CVE-2015-8327)\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses...\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses.
- foomatic-rip: SECURITY FIX: Also consider the back tick
(‘\`’) as an illegal shell escape character.
### Fixed In Version:
cups-filters **1.2.0**
### References:
https://bugzilla.redhat.com/show\_bug.cgi?id=1287523
https://lists.debian.org/debian-printing/2015/11/msg00020.html
Patch:
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
*(from redmine: issue id 4932, created on 2015-12-04, closed on 2015-12-09)*
* Relations:
* parent #4929
* Changesets:
* Revision 22d19ae2549dce27eef57e63f84720df9bcf1866 on 2015-12-09T15:41:03Z:
```
main/cups-filters: security fix CVE-2015-8327. Fixes #4932
```3.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4931[3.1] cups-filters: foomatic-rip did not consider the back tick as an illegal...2019-07-23T13:43:42ZAlicha CH[3.1] cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character (CVE-2015-8327)\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses...\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses.
- foomatic-rip: SECURITY FIX: Also consider the back tick
(‘\`’) as an illegal shell escape character.
### Fixed In Version:
cups-filters **1.2.0**
### References:
https://bugzilla.redhat.com/show\_bug.cgi?id=1287523
https://lists.debian.org/debian-printing/2015/11/msg00020.html
Patch:
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
*(from redmine: issue id 4931, created on 2015-12-04, closed on 2015-12-09)*
* Relations:
* parent #4929
* Changesets:
* Revision ecc59cf595e9eff68838813344f2ade7a5c51b89 on 2015-12-09T15:32:33Z:
```
main/cups-filters: security fix CVE-2015-8327. Fixes #4931
```3.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4930[3.2] cups-filters: foomatic-rip did not consider the back tick as an illegal...2019-07-23T13:43:44ZAlicha CH[3.2] cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character (CVE-2015-8327)\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses...\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses.
- foomatic-rip: SECURITY FIX: Also consider the back tick
(‘\`’) as an illegal shell escape character.
### Fixed In Version:
cups-filters **1.2.0**
### References:
https://bugzilla.redhat.com/show\_bug.cgi?id=1287523
https://lists.debian.org/debian-printing/2015/11/msg00020.html
Patch:
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
*(from redmine: issue id 4930, created on 2015-12-04, closed on 2015-12-09)*
* Relations:
* parent #4929
* Changesets:
* Revision ef4b8bc0255cdb792949b437c0896dfc748769d5 on 2015-12-09T15:27:56Z:
```
main/cups-filters: security fix CVE-2015-8327. Fixes #4930
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4929cups-filters: foomatic-rip did not consider the back tick as an illegal shell...2019-07-23T13:43:45ZAlicha CHcups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character (CVE-2015-8327)\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses...\- cups-browsed: When using IP-address-based device URIs via
the “IPBasedDeviceURIs” directive in cups-browsed.conf, add
two additional settings to restrict the used IP addresses to
either only IPv4 addresses or only IPv6 addresses.
- foomatic-rip: SECURITY FIX: Also consider the back tick
(‘\`’) as an illegal shell escape character.
### Fixed In Version:
cups-filters **1.2.0**
### References:
https://bugzilla.redhat.com/show\_bug.cgi?id=1287523
https://lists.debian.org/debian-printing/2015/11/msg00020.html
Patch:
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
*(from redmine: issue id 4929, created on 2015-12-04, closed on 2015-12-09)*
* Relations:
* child #4930
* child #4931
* child #4932Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4928sysctl net.ipv4.ip_forward=1 error, unknown key2019-07-23T13:43:45ZAhto Taatsysctl net.ipv4.ip_forward=1 error, unknown keyI was following the wiki page at
[http://wiki.alpinelinux.org/wiki/Wireless\_AP\_with\_udhcpd\_and\_NAT\#Test](http://wiki.alpinelinux.org/wiki/Wireless\_AP\_with\_udhcpd\_and\_NAT\#Test)
and got error message while trying to
sysctl n...I was following the wiki page at
[http://wiki.alpinelinux.org/wiki/Wireless\_AP\_with\_udhcpd\_and\_NAT\#Test](http://wiki.alpinelinux.org/wiki/Wireless\_AP\_with\_udhcpd\_and\_NAT\#Test)
and got error message while trying to
sysctl net.ipv4.ip\_forward=1
Error message on console was
>sysctl, Error, ‘net.ipv4.ip\_forward=1’ is an unknown key
Also, as side note. There was no package named ‘udhcpd’ (mentioned in
the wiki page above) in package repositories. In case it’s included into
base system, Wiki pages need overhaul.
Still, net.ipv4.ip\_forward missing key was main showstopper.
Tried it on Alpine Linux versions 3.2.3 and some version I had burned on
the cd during early spring, it probably being thus 3.1.4
Was it somehow left out of the kernel?
*(from redmine: issue id 4928, created on 2015-12-04, closed on 2017-04-07)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/4927Package upgrade: jsoncpp2019-07-23T13:43:46ZPrzemysław PawełczykPackage upgrade: jsoncppAlpine version:
[1.6.0](https://github.com/open-source-parsers/jsoncpp/releases/tag/1.6.0)
\[2015-03-15\] since commit:663da2b942d3 \[2015-03-18\]
Latest version:
[1.6.5](https://github.com/open-source-parsers/jsoncpp/releases/tag/1.6....Alpine version:
[1.6.0](https://github.com/open-source-parsers/jsoncpp/releases/tag/1.6.0)
\[2015-03-15\] since commit:663da2b942d3 \[2015-03-18\]
Latest version:
[1.6.5](https://github.com/open-source-parsers/jsoncpp/releases/tag/1.6.5)
\[2015-07-23\]
*(from redmine: issue id 4927, created on 2015-12-03, closed on 2015-12-15)*
* Changesets:
* Revision 8075d0400a849669b3c0da650404d07bdbe1e863 by Natanael Copa on 2015-12-04T13:20:09Z:
```
main/jsoncpp: upgrade to 1.6.5
fixes #4927
```3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4926Package upgrade: mercurial2019-07-23T13:43:47ZPrzemysław PawełczykPackage upgrade: mercurialAlpine version:
[3.5.2](https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.5.2_.282015-10-01.29)
\[2015-10-01\] since commit:01ff2802a045 \[2015-10-02\]
Latest version:
[3.6.2](https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial...Alpine version:
[3.5.2](https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.5.2_.282015-10-01.29)
\[2015-10-01\] since commit:01ff2802a045 \[2015-10-02\]
Latest version:
[3.6.2](https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.6.2_.282015-12-1.29)
\[2015-12-01\]
*(from redmine: issue id 4926, created on 2015-12-03, closed on 2015-12-15)*
* Changesets:
* Revision ac29b3fc0b080a3b8060a7780e09846b804af021 by Natanael Copa on 2015-12-04T13:24:57Z:
```
main/mercurial: upgrade to 3.6.2
fixes #4926
```3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4925Package upgrade: strace2019-07-23T13:43:48ZPrzemysław PawełczykPackage upgrade: straceAlpine version:
[4.9](http://sourceforge.net/projects/strace/files/strace/4.9/)
\[2014-08-15\] since commit:75ef48f5f750 \[2014-10-01\]
Latest version:
[4.10](http://sourceforge.net/projects/strace/files/strace/4.10/)
\[2015-03-06\]
...Alpine version:
[4.9](http://sourceforge.net/projects/strace/files/strace/4.9/)
\[2014-08-15\] since commit:75ef48f5f750 \[2014-10-01\]
Latest version:
[4.10](http://sourceforge.net/projects/strace/files/strace/4.10/)
\[2015-03-06\]
*(from redmine: issue id 4925, created on 2015-12-03, closed on 2015-12-18)*
* Changesets:
* Revision bcaf2dc7c02360f7075d66726339cba8410f3833 by Timo Teräs on 2015-12-18T12:32:18Z:
```
main/strace: upgrade to 4.10
fixes #4925
```3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4924Package upgrade: dropbear2019-07-23T13:43:49ZPrzemysław PawełczykPackage upgrade: dropbearAlpine version:
[2015.70](http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2015q4/001821.html)
(2015-11-26) since commit:910b0c02f95b \[2015-11-30\]
Latest version:
[2015.71](http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2015q4/00...Alpine version:
[2015.70](http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2015q4/001821.html)
(2015-11-26) since commit:910b0c02f95b \[2015-11-30\]
Latest version:
[2015.71](http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2015q4/001839.html)
(2015-12-03)
*(from redmine: issue id 4924, created on 2015-12-03, closed on 2015-12-15)*
* Changesets:
* Revision 4c104d6a68eeec04fdc3c12a8611df104139d0d3 by Natanael Copa on 2015-12-04T14:48:46Z:
```
main/dropbear: upgrade to 2015.71
fixes #4924
```3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4923Package request: sngrep2019-07-23T13:43:50ZPrzemysław PawełczykPackage request: sngrepsngrep is a tool for displaying SIP calls message flows from terminal.
It supports live capture to display realtime SIP packets and can also be
used as PCAP viewer.
Home page: https://github.com/irontec/sngrep/wiki
Version: [1.1.0](h...sngrep is a tool for displaying SIP calls message flows from terminal.
It supports live capture to display realtime SIP packets and can also be
used as PCAP viewer.
Home page: https://github.com/irontec/sngrep/wiki
Version: [1.1.0](https://github.com/irontec/sngrep/releases/tag/v1.1.0)
\[2015-10-28\]
Source: https://github.com/irontec/sngrep/archive/v1.1.0.tar.gz
*(from redmine: issue id 4923, created on 2015-12-03, closed on 2015-12-18)*
* Changesets:
* Revision 902a0943dc35670bd7064174d1c37653931e9aa9 on 2015-12-04T07:24:04Z:
```
testings/sngrep: new aport. Fixes #4923
```3.3.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/4922Package request: pseudo2020-01-18T21:10:51ZPrzemysław PawełczykPackage request: pseudopseudo — an analogue to sudo
The pseudo utility offers a way to run commands in a virtualized “root”
environment, allowing ordinary users to run commands which give the
illusion of creating device nodes, changing file ownership, and
oth...pseudo — an analogue to sudo
The pseudo utility offers a way to run commands in a virtualized “root”
environment, allowing ordinary users to run commands which give the
illusion of creating device nodes, changing file ownership, and
otherwise doing things necessary for creating distribution packages or
filesystems.
Home page:
https://www.yoctoproject.org/tools-resources/projects/pseudo
Version:
[1.7.4](http://git.yoctoproject.org/cgit/cgit.cgi/pseudo/tree/ChangeLog.txt?h=PSEUDO_1_7_4)
(2015-09-22)
Source: git only?
>When building software it can be necessary to perform operations as
if you were the system administrator. For example, you might need to
define a file’s ownership or permission information.
>
>Pseudo is a program that can either be used directly or as an
LD\_PRELOAD, which allows these operations to succeed as if the user did
have system administrator privileges even though they are an ordinary
user.
>
>Pseudo has a lot of similarities to fakeroot but is a new
implementation that improves on the problems seen using fakeroot. Pseudo
is now extensively used by Poky as a replacement to fakeroot but can
also be used standalone in many other use cases.
Resources:
[Why not
fakeroot?](https://github.com/wrpseudo/pseudo/wiki/WhyNotFakeroot)
\[2010-09-14\]
[All about pseudo, Part 1: Being root without being
root](http://www.ibm.com/developerworks/library/os-aapseudo1/)
\[2011-05-10\]
[All about pseudo, Part 2: Under the
hood](http://www.ibm.com/developerworks/library/os-aapseudo2/)
\[2011-05-17\]
*(from redmine: issue id 4922, created on 2015-12-03)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/4921Package upgrade: openssl2019-07-23T13:43:51ZPrzemysław PawełczykPackage upgrade: opensslAlpine version:
[1.0.2d](https://mta.openssl.org/pipermail/openssl-announce/2015-July/000039.html)
(2015-07-09) since commit:4cc1178d5505 (2015-07-09)
Latest version:
[1.0.2e](https://mta.openssl.org/pipermail/openssl-announce/2015-Dec...Alpine version:
[1.0.2d](https://mta.openssl.org/pipermail/openssl-announce/2015-July/000039.html)
(2015-07-09) since commit:4cc1178d5505 (2015-07-09)
Latest version:
[1.0.2e](https://mta.openssl.org/pipermail/openssl-announce/2015-December/000049.html)
(2015-12-03)
[OpenSSL Security Advisory \[3 Dec
2015\]](https://www.openssl.org/news/secadv/20151203.txt):
CVE-2015-3193, CVE-2015-3194, CVE-2015-3195
*(from redmine: issue id 4921, created on 2015-12-03, closed on 2015-12-09)*3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4920Package upgrade: drdb2019-07-23T13:43:52ZPrzemysław PawełczykPackage upgrade: drdbAlpine version:
[8.4.3](http://git.drbd.org/drbd-8.4.git/blob/drbd-8.4.6:/ChangeLog)
(2013-02-05) since commit:6da9c3f6ffb7 (2013-08-14)
Latest version:
[8.4.6](http://git.drbd.org/drbd-8.4.git/blob/drbd-8.4.6:/ChangeLog)
(2015-04-03)
...Alpine version:
[8.4.3](http://git.drbd.org/drbd-8.4.git/blob/drbd-8.4.6:/ChangeLog)
(2013-02-05) since commit:6da9c3f6ffb7 (2013-08-14)
Latest version:
[8.4.6](http://git.drbd.org/drbd-8.4.git/blob/drbd-8.4.6:/ChangeLog)
(2015-04-03)
*(from redmine: issue id 4920, created on 2015-12-03, closed on 2015-12-15)*
* Changesets:
* Revision 081d2dc8bbc688ccdb71d6a5a62e246e441514e6 by Natanael Copa on 2015-12-04T14:48:46Z:
```
main/drbd-utils: rename from drbd and upgrade to 8.9.4
fixes #4920
```3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4919Package upgrade: conky2019-07-23T13:43:53ZPrzemysław PawełczykPackage upgrade: conkyAlpine version:
[1.10.0](https://github.com/brndnmtthws/conky/releases/tag/v1.10.0)
(2015-06-22) since commit:02c464b1509e (2015-07-23)
Latest version:
[1.10.1](https://github.com/brndnmtthws/conky/releases/tag/v1.10.1)
(2015-11-18)
...Alpine version:
[1.10.0](https://github.com/brndnmtthws/conky/releases/tag/v1.10.0)
(2015-06-22) since commit:02c464b1509e (2015-07-23)
Latest version:
[1.10.1](https://github.com/brndnmtthws/conky/releases/tag/v1.10.1)
(2015-11-18)
*(from redmine: issue id 4919, created on 2015-12-03, closed on 2015-12-15)*
* Changesets:
* Revision 2d2a730f92988dc8ef8e5bc41cdd78a7ca1a9817 on 2015-12-04T07:38:43Z:
```
main/conky: upgrade to 1.10.1. Fixes #4919
```3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4918Package upgrade: cups2019-07-23T13:43:54ZPrzemysław PawełczykPackage upgrade: cupsAlpine version: 2.1.1 since commit:f956307288b9 (2015-12-02)
Latest version: 2.1.2 (2015-12-02)
>CUPS 2.1.2 fixes an issue in the 2.1.1 source archives which
actually contained a current 2.2 snapshot. There are no other changes.
*(f...Alpine version: 2.1.1 since commit:f956307288b9 (2015-12-02)
Latest version: 2.1.2 (2015-12-02)
>CUPS 2.1.2 fixes an issue in the 2.1.1 source archives which
actually contained a current 2.2 snapshot. There are no other changes.
*(from redmine: issue id 4918, created on 2015-12-03, closed on 2015-12-15)*3.3.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/4917Package upgrade: samba2019-07-23T13:43:55ZPrzemysław PawełczykPackage upgrade: sambaAlpine version:
[4.2.3](https://www.samba.org/samba/history/samba-4.2.3.html)
(2015-07-14) since commit:f317a594b122 (2015-07-15)
Latest version:
[4.3.2](https://www.samba.org/samba/history/samba-4.3.2.html)
(2015-12-01)
[Release Note...Alpine version:
[4.2.3](https://www.samba.org/samba/history/samba-4.2.3.html)
(2015-07-14) since commit:f317a594b122 (2015-07-15)
Latest version:
[4.3.2](https://www.samba.org/samba/history/samba-4.3.2.html)
(2015-12-01)
[Release Notes for Samba
4.3.0](https://www.samba.org/samba/history/samba-4.3.0.html)
One notable change in 4.3 is:
>Both client and server have support for SMB 3.1.1 now.
>
>This is the dialect introduced with Windows 10, it improves the
secure
>negotiation of SMB dialects and features.
*(from redmine: issue id 4917, created on 2015-12-03, closed on 2016-05-31)*
* Changesets:
* Revision 0c5665aae0d660f6a0d712ec5f3558e7b2f402a6 by Natanael Copa on 2016-04-27T15:59:06Z:
```
main/samba: upgrade to 4.4.2
the DC support was removed since it did not work anyway.
fixes #4917
```3.4.0Natanael CopaNatanael Copa