alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2020-01-18T21:59:50Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6252ffmpeg contains simd code which is incompatible with musl2020-01-18T21:59:50Zztsd ztsdffmpeg contains simd code which is incompatible with muslThis is an upstream issue for ffmpeg.
They are now aware of the problem but it would not hurt for somebody who
can speak for Alpine to create such an issue in their trac.
In practice, ffmpeg on Alpine-i386 works for some input/output
d...This is an upstream issue for ffmpeg.
They are now aware of the problem but it would not hurt for somebody who
can speak for Alpine to create such an issue in their trac.
In practice, ffmpeg on Alpine-i386 works for some input/output
data-and-settings combinations and segfaults for some other ones.
Theora/vp3 decoder is broken in this way but possibly something else
too.
(This is the same kind of problem as there was in libtheora, but in
other code)
*(from redmine: issue id 6252, created on 2016-10-02)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6251kodi segfault using xvfb2020-01-18T21:59:33ZMycah Mattoxkodi segfault using xvfbsteps to reproduce:
\- \# docker run -it alpine:latest /bin/sh
/ \# apk update
fetch
http://dl-cdn.alpinelinux.org/alpine/v3.4/main/x86\_64/APKINDEX.tar.gz
fetch
http://dl-cdn.alpinelinux.org/alpine/v3.4/community/x86\_64/APKINDEX....steps to reproduce:
\- \# docker run -it alpine:latest /bin/sh
/ \# apk update
fetch
http://dl-cdn.alpinelinux.org/alpine/v3.4/main/x86\_64/APKINDEX.tar.gz
fetch
http://dl-cdn.alpinelinux.org/alpine/v3.4/community/x86\_64/APKINDEX.tar.gz
v3.4.3-109-g4627942 \[http://dl-cdn.alpinelinux.org/alpine/v3.4/main\]
v3.4.4-1-g77d84e1
\[http://dl-cdn.alpinelinux.org/alpine/v3.4/community\]
OK: 5972 distinct packages available
/ \# apk add xvfb kodi
(1/148) Installing libbz2 (1.0.6-r5)
(2/148) Installing expat (2.1.1-r1)
(3/148) Installing libffi (3.2.1-r2)
….
(147/148) Installing pixman (0.34.0-r0)
(148/148) Installing xvfb (1.18.3-r0)
Executing busybox-1.24.2-r11.trigger
Executing ca-certificates-20160104-r4.trigger
Executing glib-2.48.0-r0.trigger
Executing dbus-1.10.8-r1.trigger
Executing mkfontscale-1.0.7-r2.trigger
Executing mkfontdir-1.0.5-r1.trigger
Executing fontconfig-2.12.1-r0.trigger
OK: 200 MiB in 159 packages
/ \# export DISPLAY=:0
/ \# Xvfb :0 -screen 0 1024x768x16 &
/ \# kodi
/usr/lib/kodi/kodi-xrandr: Failed to get size of gamma for output
screen
Segmentation fault (core dumped)
Crash report available at /root/kodi\_crashlog-20161001\_045234.log
I’ve enclosed the crash log and an strace capture run with gdb.
I have a similar setup in ubuntu which works and gives the same “Failed
to get size of gamma for output screen” warning.
Thanks.
*(from redmine: issue id 6251, created on 2016-10-01)*
* Uploads:
* [kodi_crashlog-20161001_045234.log](/uploads/3a5d49f373dd7ad972d4e9528b833afb/kodi_crashlog-20161001_045234.log)
* [strace.log](/uploads/d5e902bd992f9dfcc34fae21714018fb/strace.log)https://gitlab.alpinelinux.org/alpine/aports/-/issues/6250linux-virtgrsec-dev installs linux-grsec-dev2019-07-15T17:53:20Zalgitbotlinux-virtgrsec-dev installs linux-grsec-devHello,
It looks like installing linux-virtgrsec-dev will install
linux-grsec-dev:
When installing linux-virtgrsec-dev, files are stored in
/lib/modules/4.4.22-0-grsec. They should be stored in
/lib/modules/4.4.22-0-virtgrsec.
When o...Hello,
It looks like installing linux-virtgrsec-dev will install
linux-grsec-dev:
When installing linux-virtgrsec-dev, files are stored in
/lib/modules/4.4.22-0-grsec. They should be stored in
/lib/modules/4.4.22-0-virtgrsec.
When one compiles a kernel module with this package, the kernel object
cannot be inserted to the VM-friendly grsec kernel. It works perfectly
on the regular grsec kernel.
This problem occured on a clean Alpine 3.4.4 install
*(from redmine: issue id 6250, created on 2016-10-01)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6249Package request: PostgreSQL 9.62019-07-23T12:07:16ZAlexey SlobodiskiyPackage request: PostgreSQL 9.6PostgreSQL 9.6 was released today:
https://www.postgresql.org/about/news/1703/
It would be great to have that in Alpine Linux!
*(from redmine: issue id 6249, created on 2016-09-29, closed on 2017-05-22)*PostgreSQL 9.6 was released today:
https://www.postgresql.org/about/news/1703/
It would be great to have that in Alpine Linux!
*(from redmine: issue id 6249, created on 2016-09-29, closed on 2017-05-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6248Package request: cwm window manager2019-07-14T18:42:36ZBorut JapeljPackage request: cwm window managercwm (window manager) https://github.com/chneukirchen/cwm
Tried to make it
Package fontconfig was not found in the pkg-config search path.
Perhaps you should add the directory containing “fontconfig.pc”
to the PKG\_CONFIG\_PATH envi...cwm (window manager) https://github.com/chneukirchen/cwm
Tried to make it
Package fontconfig was not found in the pkg-config search path.
Perhaps you should add the directory containing “fontconfig.pc”
to the PKG\_CONFIG\_PATH environment variable
Package “fontconfig”, required by “world” , not found
Package “x11”, required by “world” , not found
Package “xft”, required by “world” , not found
Package “xrandr”, required by “world” , not found
*(from redmine: issue id 6248, created on 2016-09-28)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6237php5-imagick is outdated with imagemagick2019-07-23T12:07:31ZAlexey Slobodiskiyphp5-imagick is outdated with imagemagick# apk add --update imagemagick php5-cli
Installing imagemagick (6.9.5.9-r0)
Installing php5-cli (5.6.26-r0)
# apk add --update --repository http://dl-cdn.alpinelinux.org/alpine/v3.4/community php5-imagick
Installing php5...# apk add --update imagemagick php5-cli
Installing imagemagick (6.9.5.9-r0)
Installing php5-cli (5.6.26-r0)
# apk add --update --repository http://dl-cdn.alpinelinux.org/alpine/v3.4/community php5-imagick
Installing php5-imagick (3.4.2-r0)
gives next error at any PHP script executed on the host:
PHP Warning: Version warning: Imagick was compiled against Image Magick version 1684 but version 1685 is loaded. Imagick will run but may behave surprisingly in Unknown on line 0
Seems like php5-imagick should be recompiled with latest version of
imagemagick
*(from redmine: issue id 6237, created on 2016-09-28, closed on 2016-09-28)*
* Changesets:
* Revision b5550367e38c7dc1ef7970b697b7f8657316fda5 by Natanael Copa on 2016-09-28T14:39:51Z:
```
community/php5-imagick: rebuild against new imagemagick
fixes #6237
```3.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6228Squid illegal instruction error2019-07-23T12:07:40ZDarko MalovicSquid illegal instruction errorSquid daemon shows two illegal instruction error on start.
Same error occurs when using command in shell like
squid -k check
or just
squid.
Tested different squid package version from 3.4\* to 3.5\* show illegal
instruction error...Squid daemon shows two illegal instruction error on start.
Same error occurs when using command in shell like
squid -k check
or just
squid.
Tested different squid package version from 3.4\* to 3.5\* show illegal
instruction error.
Issue tested and exist on Pentium III PAE processors, Pentium 4
processors.
Squid start without error on Intel i3 and i5 processors.
*(from redmine: issue id 6228, created on 2016-09-28, closed on 2017-04-07)*
* Changesets:
* Revision 91d41614d8929270e4fe6a71af4d08aff3088fd8 by Timo Teräs on 2016-11-04T11:25:45Z:
```
main/squid: don't use -march=native
It otherwise generates code specific for the builder cpu.
ref #6228
```
* Revision 46385baad3510a641a39c5f8d87d2502a21ec34c by Timo Teräs on 2016-11-04T11:27:52Z:
```
main/squid: upgrade to 3.5.20, don't use -march=native
It otherwise generates code specific for the builder cpu.
ref #6228
```
* Revision 75230c207a798303522397ad5c4f440b49080cfc by Timo Teräs on 2016-11-04T11:29:15Z:
```
main/squid: don't use -march=native
It otherwise generates code specific for the builder cpu.
ref #6228
```Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6221DNS hangs 5 secs on VirtualBox with --natdnshostresolver12019-07-23T11:17:42ZBryan TalbotDNS hangs 5 secs on VirtualBox with --natdnshostresolver1When running an alpinelinux guest using VirtualBox on OSX, DNS lookups
hang for 5 seconds if the VB option —natdnshostresolver1 is enabled.
The —natdnshostresolver1 option has VB network/NAT intercept DNS
requests and use the OSX host r...When running an alpinelinux guest using VirtualBox on OSX, DNS lookups
hang for 5 seconds if the VB option —natdnshostresolver1 is enabled.
The —natdnshostresolver1 option has VB network/NAT intercept DNS
requests and use the OSX host resolver to perform the lookup instead of
the normal network. This is useful in development environments when the
/etc/hosts should be used to resolve some hosts. This also affects
docker containers of alpine running in the VB guest as well. The vagrant
setup for CoreOS (and possibly other distros) enable the
—natdnshostresolver1 by default.
Since getting VB running alpine as a guest directly is non-trivial to
setup, I’ll demonstrate the bug using Vagrant with the Vagrantfile show
here:
btalbot-lt:alpine$ cat Vagrantfile
Vagrant.configure(“2”) do |config|
config.vm.box = “maier/alpine-3.4-x86\_64”
config.vm.synced\_folder “.”, “/vagrant”, disabled: true
config.vm.provider “virtualbox” do |vb|
vb.customize \[‘modifyvm’, :id, ‘—natdnshostresolver1’, ‘on’\]
end
end
btalbot-lt:alpine$ vagrant up
<… stuff to console elided …>
btalbot-lt:alpine$ vagrant ssh
alpine34:~$ time ping -c 1 www.google.com
PING www.google.com (216.58.194.164): 56 data bytes
64 bytes from 216.58.194.164: seq=0 ttl=42 time=6.700 ms
—- www.google.com ping statistics —-
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max = 6.700/6.700/6.700 ms
real 0m 5.01s
user 0m 0.00s
sys 0m 0.00s
A tcpdump of the DNS traffic from the alpine guest shows that responses
for the A and AAAA queries are returned, but then the alpine guest seems
to ignore the AAAA response, wait 2.5 seconds, and repeat the request
again (and then ignore the response) before timing out after another 2.5
seconds.
22:34:45.724471 IP 10.0.2.15.52190 >10.0.2.3.53: 27848+ A?
www.google.com. (32)
22:34:45.724542 IP 10.0.2.15.52190 >10.0.2.3.53: 28141+ AAAA?
www.google.com. (32)
22:34:45.812045 IP 10.0.2.3.53 >10.0.2.15.52190: 27848 1/0/0 A
216.58.194.164 (48)
22:34:45.812068 IP 10.0.2.3.53 >10.0.2.15.52190: 28141 NotImp 0/0/0
(32)
22:34:48.228641 IP 10.0.2.15.52190 >10.0.2.3.53: 28141+ AAAA?
www.google.com. (32)
22:34:48.228965 IP 10.0.2.3.53 >10.0.2.15.52190: 28141 NotImp 0/0/0
(32)
There are no interesting logs in /var/log/messages. The DNS resolver
clearly doesn’t like the response to the AAAA query but exactly what it
does not like about it is not clear to me but my speculation is that the
response is not a valid AAAA response. Maybe the alpine resolver can
handle this response in a way that doesn’t block resolution and just
return the A record result right away instead of waiting 5 seconds?
*(from redmine: issue id 6221, created on 2016-09-27, closed on 2018-12-06)*
* Relations:
* duplicates #97343.8.2https://gitlab.alpinelinux.org/alpine/aports/-/issues/6220Podbeuter/Newsbeuter segfault on download2019-07-23T12:07:47ZMike DevinePodbeuter/Newsbeuter segfault on downloadnewsbeuter 2.9-r2 is fundamentally broken - as podbeuter segfaults as
soon as any download is started.
Same bug as described here: https://bugs.archlinux.org/task/44421
and here: https://github.com/akrennmair/newsbeuter/issues/167
Re...newsbeuter 2.9-r2 is fundamentally broken - as podbeuter segfaults as
soon as any download is started.
Same bug as described here: https://bugs.archlinux.org/task/44421
and here: https://github.com/akrennmair/newsbeuter/issues/167
Reverting to newsbeuter 2.8-1 fixes the issue.
*(from redmine: issue id 6220, created on 2016-09-26, closed on 2016-09-28)*
* Changesets:
* Revision 57d85d500f14cf07ad4a797d68d221a59a29cb0c by Natanael Copa on 2016-09-26T20:07:01Z:
```
main/newsbeuter: fix segfault
ref #6220
```
* Revision 44636dcb11d4586c00be1a459701ef46e1441a53 by Natanael Copa on 2016-09-26T20:08:04Z:
```
main/newsbeuter: fix segfault
fixes #6220
```
* Revision c35b0b809dc21194dae7b0d8a733b5dbf22535cd by Natanael Copa on 2017-08-22T17:51:31Z:
```
main/newsbeuter: fix segfault
fixes #6220
(cherry picked from commit 44636dcb11d4586c00be1a459701ef46e1441a53)
```3.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6219Can't run setup-alpine on a machine behind a proxy2019-07-23T12:07:48ZAdrian HeskethCan't run setup-alpine on a machine behind a proxyI tried to setup Alpine on a Virtualbox machine behind a corporate
proxy, but couldn’t get the setup-alpine to run.
I followed the steps at
https://wiki.alpinelinux.org/wiki/Alpine\_setup\_scripts :
- Insert Alpine ISO into VirtualBo...I tried to setup Alpine on a Virtualbox machine behind a corporate
proxy, but couldn’t get the setup-alpine to run.
I followed the steps at
https://wiki.alpinelinux.org/wiki/Alpine\_setup\_scripts :
- Insert Alpine ISO into VirtualBox machine.
- Start up Alpine, logon as root.
- Run setup-alpine.
- Follow the network setup.
- Enter the proxy address, e.g. http://10.0.2.2:3128
- (10.0.2.2 is the address of the virtualbox host, using this as the
proxy works fine for wget requests other than in the setup scripts)
- When the setup-apkrepos section runs with option f -
“find\_fastest\_mirror()”, none of the endpoints can be reached
(destination unreachable)
- When the setup-disk section runs, it then quits with error:
<!-- -->
ERROR: unsatisfiable constraints:
e2fsprogs (missing):
required by: world[e2fsprogs]
When I reviewed the script at /sbin/setup-apkrepos I found a line which
actually clears the proxy setting:
find_fastest_mirror() {
export http_proxy=
I think it’s in git at:
http://git.alpinelinux.org/cgit/alpine-conf/tree/setup-apkrepos.in
As a workaround, I commented out that line, then ran setup-apkrepos
again, followed by setup-disk. This resolved the issue for me, and I was
able to install.
I can’t think why that line would be present in the script, but there
must be a reason. If there isn’t a really good reason, then that line
should probably be removed, on the basis that people who have to work
behind a proxy already suffer enough.
*(from redmine: issue id 6219, created on 2016-09-26, closed on 2016-09-28)*
* Changesets:
* Revision 380c607492fcd9f09d104653b664a26c4b048ff5 by Natanael Copa on 2016-09-27T18:36:29Z:
```
main/alpine-conf: dont reset http_proxy in setup-apkrepos
ref #6219
```
* Revision 14d3fa6490c97334b4f25dbf1bcb329b61e5b63d by Natanael Copa on 2016-09-27T18:46:19Z:
```
main/alpine-conf: dont reset http_proxy in setup-apkrepos
fixes #6219
(cherry picked from commit 380c607492fcd9f09d104653b664a26c4b048ff5)
```
* Revision be595d2f343ecd075a57930f475df1408a7b6b57 by Natanael Copa on 2016-11-10T10:20:39Z:
```
setup-apkrepos: dont reset http_proxy
it is likely needed if it is set.
ref #6219
```3.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6217nlplug-findfs segfaults on bogus extraneous cryptsetup execution2019-07-23T12:07:49Z7heo .tknlplug-findfs segfaults on bogus extraneous cryptsetup executionWhen opening a <code>cryptsetup</code> device with
<code>nlplug-findfs</code>, the device is first unlocked correctly, and
then <code>cryptsetup</code> is called a second time, and continues
asking for the passphrase until the amount of ...When opening a <code>cryptsetup</code> device with
<code>nlplug-findfs</code>, the device is first unlocked correctly, and
then <code>cryptsetup</code> is called a second time, and continues
asking for the passphrase until the amount of tries is exhausted. Then
the application segfaults, while the <code>cryptsetup</code> device is
open correctly (from the first execution).
*(from redmine: issue id 6217, created on 2016-09-26, closed on 2017-04-07)*
* Changesets:
* Revision 386aab2ad0e7becf3db1de3fc70d124cd85f5d47 by Timo Teräs on 2016-11-24T12:07:52Z:
```
main/mkinitfs: upgrade to 3.0.6
fixes #6217
fixes #6469
fixes #6473
```7heo .tk7heo .tkhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6216php-fpm.conf includes conf.d in the very beginning2019-07-15T01:40:57Zvovodroid .php-fpm.conf includes conf.d in the very beginningCurrently line
include = /etc/php5/fpm.d/*.conf
is placed in the very beginning of php-fmp.conf, thus preventing from
overriding default settings with a help of files in fpm.d folder.
Is it reasonable to put it in the end?
Reg...Currently line
include = /etc/php5/fpm.d/*.conf
is placed in the very beginning of php-fmp.conf, thus preventing from
overriding default settings with a help of files in fpm.d folder.
Is it reasonable to put it in the end?
Regards.
*(from redmine: issue id 6216, created on 2016-09-26)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6215freeswitch hangs with message "switch_core.c:2762 Shutting down" on Alpine Li...2020-01-18T21:59:26ZPeter Kelmfreeswitch hangs with message "switch_core.c:2762 Shutting down" on Alpine Linux 3.4.3 / Raspberry ZeroTried to setup FreeSwitch voicemail on my Raspberry Pi Zero with Alpine
Linux 3.4.3, closely following the instructions in the Wiki:
https://wiki.alpinelinux.org/wiki/Freeswitch\_Voicemail\_On\_Alpine\_Linux
But regardless of the Free...Tried to setup FreeSwitch voicemail on my Raspberry Pi Zero with Alpine
Linux 3.4.3, closely following the instructions in the Wiki:
https://wiki.alpinelinux.org/wiki/Freeswitch\_Voicemail\_On\_Alpine\_Linux
But regardless of the FreeSwitch configuration - the software hangs
during launch. From /var/log/freeswitch.log:
2016-09-24 10:39:54.273061 [NOTICE] switch_loadable_module.c:338 Adding API Function 'httapi'
2016-09-24 10:39:54.273749 [NOTICE] switch_loadable_module.c:390 Adding File Format 'http'
2016-09-24 10:39:54.274404 [NOTICE] switch_loadable_module.c:390 Adding File Format 'https'
2016-09-24 10:39:54.276108 [NOTICE] switch_loadable_module.c:250 Adding Dialplan 'XML'
2016-09-24 10:39:54.288570 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.288888 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.289089 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.289283 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.289470 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.289657 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.289844 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.290031 [INFO] switch_core.c:2762 Shutting down
2016-09-24 10:39:54.290216 [INFO] switch_core.c:2762 Shutting down
“/etc/init.d/freeswitch stop” fails to stop the process, requiring to
terminate it via “kill –9”.
Has this been encountered before?
*(from redmine: issue id 6215, created on 2016-09-24)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6205Failed to resolve hostname2020-01-18T21:59:18ZPavel PrischepaFailed to resolve hostnameVPS at Azure cloud
Kubernetes v1.2.5
/erc/resolv.conf
nameserver 172.21.251.41
search wodby.svc.wodby.local svc.wodby.local wodby.local 0xo4l4idwj3uxeidhy1npgiizb.fx.internal.cloudapp.net
options ndots:5
Failed to ping g...VPS at Azure cloud
Kubernetes v1.2.5
/erc/resolv.conf
nameserver 172.21.251.41
search wodby.svc.wodby.local svc.wodby.local wodby.local 0xo4l4idwj3uxeidhy1npgiizb.fx.internal.cloudapp.net
options ndots:5
Failed to ping google.com or any other external domains.
ping google.com
ping: bad address 'google.com'
I can ping google.com if I deleted
**0xo4l4idwj3uxeidhy1npgiizb.fx.internal.cloudapp.net** from the
“/erc/resolv.conf” file.
*(from redmine: issue id 6205, created on 2016-09-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6204Upgrade irssi to 0.8.202019-07-23T12:08:01ZThorben WentUpgrade irssi to 0.8.20Please upgrade irssi to 0.8.20
Blog: https://irssi.org/2016/09/21/irssi-0.8.20-released/
From https://raw.githubusercontent.com/irssi/irssi/0.8.20/NEWS:
v0.8.20 2016-09-16 The Irssi team <staff@irssi.org>
- Correct the na...Please upgrade irssi to 0.8.20
Blog: https://irssi.org/2016/09/21/irssi-0.8.20-released/
From https://raw.githubusercontent.com/irssi/irssi/0.8.20/NEWS:
v0.8.20 2016-09-16 The Irssi team <staff@irssi.org>
- Correct the name of an emitted sasl signal (#484)
- Correct the prototype for the 'message private' signal (#515)
- Corrections in away and hilight help text (#477, #518)
- /squery and /servlist commands have been restored.
- Where Irssi would previously only report "System error" on connect,
it will now try harder to retrieve the system error message.
- Fixed issue with +channels not working properly (#533)
- Fixed crash in optchan when item has no server (#485)
- Fixed random remote crash in the nicklist handling (#529)
- Fixed remote crash due to incorrect bounds checking on
formats, reported by Gabriel Campana and Adrien Guinet from
Quarkslab.
*(from redmine: issue id 6204, created on 2016-09-22, closed on 2016-09-23)*
* Changesets:
* Revision 8e2f95e21e5b577b7653f992e408ddb767da1cf3 by Natanael Copa on 2016-09-22T08:35:53Z:
```
main/irssi: upgrade to 0.8.20
ref #6204
```
* Revision b86088878d20d3e51754c70701fc2ce39bc2ab97 by Natanael Copa on 2016-09-22T09:28:35Z:
```
main/irssi: upgrade to 0.8.20
fixes #6204
(cherry picked from commit 8e2f95e21e5b577b7653f992e408ddb767da1cf3)
```3.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6203Package Request: biblatex2019-07-23T12:08:02ZalgitbotPackage Request: biblatexERROR - Error: Found biblatex control file version 3.1, expected version
3.2.
This means that your biber (2.6) and biblatex (3.4) versions are
incompatible.
The biber package was updated and stopped working because it requires a
new v...ERROR - Error: Found biblatex control file version 3.1, expected version
3.2.
This means that your biber (2.6) and biblatex (3.4) versions are
incompatible.
The biber package was updated and stopped working because it requires a
new version of biblatex.
The biblatex version shipped with texlive is incompatible.
So I request a biblatex APKBUILD with the latest version, that is
up-to-date and compatible with the newest biber.
That way biber will work again.
Thanks.
*(from redmine: issue id 6203, created on 2016-09-21, closed on 2017-05-22)*
* Changesets:
* Revision 8db9f55a08657c45de84c0108bd4f71c9365194d on 2016-09-21T12:13:01Z:
```
testing/biblatex: new aport. Fixes #6203
```Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6202Explicit HTTP links in header on the official site (Should be HTTPS!)2019-07-23T12:08:03ZJames McGlashanExplicit HTTP links in header on the official site (Should be HTTPS!)http://git.alpinelinux.org/cgit/alpine-mksite/tree/\_default.template.html
Either use //wiki., etc or https://
*(from redmine: issue id 6202, created on 2016-09-21, closed on 2017-05-22)*http://git.alpinelinux.org/cgit/alpine-mksite/tree/\_default.template.html
Either use //wiki., etc or https://
*(from redmine: issue id 6202, created on 2016-09-21, closed on 2017-05-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6200X509 certificate expired for forum.alpinelinux.org2019-07-23T12:08:04ZJames McGlashanX509 certificate expired for forum.alpinelinux.orghttps://forum.alpinelinux.org/forum
*(from redmine: issue id 6200, created on 2016-09-21, closed on 2016-09-29)*
* Relations:
* duplicates #6125https://forum.alpinelinux.org/forum
*(from redmine: issue id 6200, created on 2016-09-21, closed on 2016-09-29)*
* Relations:
* duplicates #6125https://gitlab.alpinelinux.org/alpine/aports/-/issues/6199[3.1] phpmyadmin: Multiple vulnerabilities (Various CVEs)2019-07-12T15:14:52ZAlicha CH[3.1] phpmyadmin: Multiple vulnerabilities (Various CVEs)### CVE-2016-6606: Weakness with cookie encryption
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newe...### CVE-2016-6606: Weakness with cookie encryption
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-29/
### CVE-2016-6607: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-30/
### CVE-2016-6608: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4) are affected
Upgrade to phpMyAdmin 4.6.4 or newer or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-31/
### CVE-2016-6609: PHP code injection
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-32/
### CVE-2016-6610: Full path disclosure
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-33/
### CVE-2016-6611: SQL injection attack
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-34/
### CVE-2016-6612: Local file exposure
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-35/
### CVE-2016-6613: Local file exposure through symlinks with UploadDir
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-36/
### CVE-2016-6614: Path traversal with SaveDir and UploadDir
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-37/
### CVE-2016-6615: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to
4.4.15.8) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or newer or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-38/
### CVE-2016-6616: SQL injection attack
All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to
4.4.15.8) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or newer or apply patch
https://www.phpmyadmin.net/security/PMASA-2016-39/
### CVE-2016-6617: SQL injection attack
All 4.6.x versions (prior to 4.6.4) are affected.
Upgrade to phpMyAdmin 4.6.4 or newer, or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-40/
### CVE-2016-6618: Denial of service (DOS) attack in transformation feature
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-41/
### CVE-2016-6619: SQL injection attack as control user
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-42/
### CVE-2016-6620: Unvalidated data passed to unserialize()
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-43/
### CVE-2016-6622: DOS attack with forced persistent connections
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-45/
### CVE-2016-6623: Denial of service (DOS) attack by for loops
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-46/
### CVE-2016-6624: IPv6 and proxy server IP-based authentication rule circumvention
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-47/
### CVE-2016-6625: Detect if user is logged in
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-48/
### CVE-2016-6626: Bypass URL redirect protection
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer.
https://www.phpmyadmin.net/security/PMASA-2016-49/
### CVE-2016-6627: Referrer leak in url.php
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-50/
### CVE-2016-6628: Reflected File Download attack
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-51/
### CVE-2016-6629: ArbitraryServerRegexp bypass
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-52/
### CVE-2016-6630: Denial of service (DOS) attack by changing password to a very long string
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-53/
### CVE-2016-6631: Remote code execution vulnerability when run as CGI
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-54/
### CVE-2016-6632: Denial of service (DOS) attack with dbase extension
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-55/
### CVE-2016-6633: Remote code execution vulnerability when PHP is running with dbase extension
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-56/
*(from redmine: issue id 6199, created on 2016-09-20, closed on 2016-10-18)*
* Relations:
* parent #61943.1.5https://gitlab.alpinelinux.org/alpine/aports/-/issues/6197[3.3] phpmyadmin: Multiple vulnerabilities (Various CVEs)2019-07-12T15:14:50ZAlicha CH[3.3] phpmyadmin: Multiple vulnerabilities (Various CVEs)### CVE-2016-6606: Weakness with cookie encryption
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newe...### CVE-2016-6606: Weakness with cookie encryption
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-29/
### CVE-2016-6607: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-30/
### CVE-2016-6608: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4) are affected
Upgrade to phpMyAdmin 4.6.4 or newer or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-31/
### CVE-2016-6609: PHP code injection
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-32/
### CVE-2016-6610: Full path disclosure
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-33/
### CVE-2016-6611: SQL injection attack
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-34/
### CVE-2016-6612: Local file exposure
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-35/
### CVE-2016-6613: Local file exposure through symlinks with UploadDir
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-36/
### CVE-2016-6614: Path traversal with SaveDir and UploadDir
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-37/
### CVE-2016-6615: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to
4.4.15.8) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or newer or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-38/
### CVE-2016-6616: SQL injection attack
All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to
4.4.15.8) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or newer or apply patch
https://www.phpmyadmin.net/security/PMASA-2016-39/
### CVE-2016-6617: SQL injection attack
All 4.6.x versions (prior to 4.6.4) are affected.
Upgrade to phpMyAdmin 4.6.4 or newer, or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-40/
### CVE-2016-6618: Denial of service (DOS) attack in transformation feature
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-41/
### CVE-2016-6619: SQL injection attack as control user
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-42/
### CVE-2016-6620: Unvalidated data passed to unserialize()
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-43/
### CVE-2016-6622: DOS attack with forced persistent connections
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-45/
### CVE-2016-6623: Denial of service (DOS) attack by for loops
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-46/
### CVE-2016-6624: IPv6 and proxy server IP-based authentication rule circumvention
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-47/
### CVE-2016-6625: Detect if user is logged in
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-48/
### CVE-2016-6626: Bypass URL redirect protection
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer.
https://www.phpmyadmin.net/security/PMASA-2016-49/
### CVE-2016-6627: Referrer leak in url.php
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-50/
### CVE-2016-6628: Reflected File Download attack
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-51/
### CVE-2016-6629: ArbitraryServerRegexp bypass
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-52/
### CVE-2016-6630: Denial of service (DOS) attack by changing password to a very long string
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-53/
### CVE-2016-6631: Remote code execution vulnerability when run as CGI
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-54/
### CVE-2016-6632: Denial of service (DOS) attack with dbase extension
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-55/
### CVE-2016-6633: Remote code execution vulnerability when PHP is running with dbase extension
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-56/
*(from redmine: issue id 6197, created on 2016-09-20, closed on 2016-10-18)*
* Relations:
* parent #61943.3.4