https://bugzilla.novell.com/show_bug.cgi?id=805767https://bugzilla.novell.com/show_bug.cgi?id=805767#c0
Summary: huge plymouth theme in initrd
Classification: openSUSE
Product: openSUSE 12.3
Version: RC 1
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Basesystem
AssignedTo: tittiatcoke(a)gmail.com
ReportedBy: lnussel(a)suse.com
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
There are 23MB of pylmouth theme files in the initrd. Maybe there is a way to
omit some files to shrink the total size of initrd making boot even faster.
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=629374http://bugzilla.novell.com/show_bug.cgi?id=629374#c0
Summary: desktop-data-openSUSE contains some KDE-specific bits
Classification: openSUSE
Product: openSUSE 11.4
Version: Factory
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: KDE4 Workspace
AssignedTo: kde-maintainers(a)suse.de
ReportedBy: vuntz(a)novell.com
QAContact: qa(a)suse.de
Found By: ---
Blocker: ---
Here are some bits in desktop-data-openSUSE that should probably live in some
of the kde branding packages (or in qt):
+ etc/kde4/: contains kdm/backgroundrc (should live in kdm-branding-openSUSE)
+ etc/profile.d/desktop-data.* and usr/share/desktop-data: the scripts have a
line to set QT_SYSTEM_DIR to /usr/share/desktop-data. This should really
live
in a qt package.
I'm also wondering about everything in etc/xdg/menus/,
usr/share/desktop-directories/ and usr/share/icons/: this contains the XDG menu
structure, except that GNOME now uses something else since we were not happy
with this structure and were unable to make any real progress on changing it.
LXDE also doesn't use it. So it's now more or less KDE-specific...
Finally, etc/skel/ contains public_html. Is this something you want to keep? I
know it annoys me to have this directory created.
--
Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=803057https://bugzilla.novell.com/show_bug.cgi?id=803057#c0
Summary: PostgreSQL 9.2.3, 9.1.8, 9.0.12, 8.4.16 and 8.3.23
released
Classification: openSUSE
Product: openSUSE 12.2
Version: Final
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Security
AssignedTo: security-team(a)suse.de
ReportedBy: lijewski.stefan(a)zabka.pl
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:18.0) Gecko/20100101
Firefox/18.0
>From postgresql.org:
The PostgreSQL Global Development Group has released a security update to all
current versions of the PostgreSQL database system, including versions 9.2.3,
9.1.8, 9.0.12, 8.4.16, and 8.3.23. This update fixes a denial-of-service (DOS)
vulnerability. All users should update their PostgreSQL installations as soon
as possible.
The security issue fixed in this release, CVE-2013-0255, allows a previously
authenticated user to crash the server by calling an internal function with
invalid arguments. This issue was discovered by independent security researcher
Sumit Soni this week and reported via Secunia SVCRP, and we are grateful for
their efforts in making PostgreSQL more secure.
Today's update also fixes a performance regression which caused a decrease in
throughput when using dynamic queries in stored procedures in version 9.2.
Applications which use PL/pgSQL's EXECUTE are strongly affected by this
regression and should be updated. Additionally, we have fixed intermittent
crashes caused by CREATE/DROP INDEX CONCURRENTLY, and multiple minor issues
with replication.
Reproducible: Always
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=820566https://bugzilla.novell.com/show_bug.cgi?id=820566#c0
Summary: wireshark security updates to 1.8.7 and 1.6.15
Classification: openSUSE
Product: openSUSE 12.3
Version: Final
Platform: All
OS/Version: openSUSE 12.3
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Security
AssignedTo: security-team(a)suse.de
ReportedBy: Andreas.Stieger(a)gmx.de
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:20.0) Gecko/20100101
Firefox/20.0
https://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html
wnpa-sec-2013-23
CVE-2013-2486
CVE-2013-2487
The RELOAD dissector could go into an infinite loop.
wnpa-sec-2013-24
The GTPv2 dissector could crash.
wnpa-sec-2013-25
The ASN.1 BER dissector could crash.
wnpa-sec-2013-26
The PPP CCP dissector could crash.
wnpa-sec-2013-27
The DCP ETSI dissector could crash.
wnpa-sec-2013-28
The MPEG DSM-CC dissector could crash.
wnpa-sec-2013-29
The Websocket dissector could crash.
wnpa-sec-2013-30
The MySQL dissector could go into an infinite loop.
wnpa-sec-2013-31
The ETCH dissector could go into a large loop.
https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html
1.6.15
wnpa-sec-2013-25
The ASN.1 BER dissector could crash
Reproducible: Always
Steps to Reproduce:
1.
2.
3.
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=800701https://bugzilla.novell.com/show_bug.cgi?id=800701#c0
Summary: X windows is corrupt after logging in on an AMD
A10-5800K APU
Classification: openSUSE
Product: openSUSE Factory
Version: 12.3 Beta 1
Platform: x86-64
OS/Version: Other
Status: NEW
Severity: Critical
Priority: P5 - None
Component: Xen
AssignedTo: jdouglas(a)suse.com
ReportedBy: ajbiii(a)comcast.net
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:7.0.1) Gecko/20100101
Firefox/7.0.1
Installed 12.3. The regular kernel and X windows works fine. Reboot to the
xen kernel. The login screen is displayed correctly. After logging in, the
display is corrupt. The mouse pointer is ok and I can see that the menu is
active by putting the cursor in the lower left corner and clicking but the
display is unusable.
Just an aside: The xen kernel wouldn't even boot on the APU with 12.1 or 12.2.
Reproducible: Always
Steps to Reproduce:
1. Install 12.3 on an AMD Trinity APU.
2. Boot regular kernel, log in and verify X is working.
3. Reboot with the xen kernel.
4. Log in and observe the corruption
Actual Results:
Screen is corrupt
Expected Results:
Normal X windows operation
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=813340https://bugzilla.novell.com/show_bug.cgi?id=813340#c0
Summary: Suspected memory corruption in standard capi20 lib
Classification: openSUSE
Product: openSUSE Factory
Version: 13.1 Milestone 0
Platform: x86-64
OS/Version: openSUSE 12.3
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Network
AssignedTo: bnc-team-screening(a)forge.provo.novell.com
ReportedBy: jan.fengler(a)adviqo.com
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML,
like Gecko) Chrome/26.0.1410.43 Safari/537.31
The capi20 lib from the i4l-base source-package from
http://download.opensuse.org/repositories/home:/kkeil:/ISDN/openSUSE_Factor…
(and also Version 3.23-100.1 which is newer) seems to create memory corruption
during capi20_put_message sending data_b3_req, because no memory is assigned
for the data that is put behind the original message in the function
capi_processMessage (capi20.c row 962ff).
Unfortunately this seems to be a private function and so i could not easily
write a test against the entire lib.
Reproducible: Always
Steps to Reproduce:
I provide an example program that uses a 1:1 copy of the original function.
I use capi via JNI from Java and it crashes when freeing memory exactly as the
test program does.
Actual Results:
Memory corruption when freeing the memory used for the data_b3_req-message.
Expected Results:
No memory corruption, the program should terminate without a problem.
The last known working version (from openSuSE 10.3) assigned memory for
SND_BUFSIZ bytes and copied the original message to this before copying the
data bytes after the message and that worked.
I will change the code of the function standardPutMessage to do this to avoid
the problem and add a patch to this bug report if it works with the patch.
I must admit that i could have overseen something, but unfortunately it seems
not so far.
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=700065https://bugzilla.novell.com/show_bug.cgi?id=700065#c0
Summary: the wiki produces invalid XHTML
Classification: openSUSE
Product: openSUSE.org
Version: unspecified
Platform: x86-64
OS/Version: openSUSE 11.4
Status: NEW
Severity: Minor
Priority: P5 - None
Component: Wiki
AssignedTo: bnc-team-screening(a)forge.provo.novell.com
ReportedBy: giecrilj(a)stegny.2a.pl
QAContact: adrian(a)novell.com
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:2.0.1) Gecko/20100101
Firefox/4.0.1
The wiki pages are declared to be XHTML 1.0 Transitional. A script inserted
into every HEAD violates this declaration.
Reproducible: Always
Steps to Reproduce:
1. Validate <URL: http://en.opensuse.org/Main_Page >.
2. Inspect the document source.
Actual Results:
1. Line 21, Column 16: required attribute "type" not specified
2. <script>
Expected Results:
1. No errors
2. <script type="text/javascript" >
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=682920https://bugzilla.novell.com/show_bug.cgi?id=682920#c0
Summary: strange defaults in mailman
Classification: openSUSE
Product: openSUSE 11.3
Version: Final
Platform: Other
OS/Version: openSUSE 11.3
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Basesystem
AssignedTo: jmatejek(a)novell.com
ReportedBy: suse-beta(a)cboltz.de
QAContact: qa(a)suse.de
Found By: Beta-Customer
Blocker: ---
(partly copied from
http://mail.python.org/pipermail/mailman-users/2007-November/058954.html
after seeing the same problem on 11.3)
I called "/usr/lib/mailman/bin/newlist mailman" to create the master mailing
list. Doing so resulted in the error
Bad owner email address: mailman@(unused)
The openSUSE Mailman package sets DEFAULT_URL_HOST and DEFAULT_EMAIL_HOST to
'(unused)' in Defaults.py, which causes this problem.
Please use a default without parenthesis - according to the mail I linked
above, this should display the "correct" error message about an invalid list
address.
Of course it would be even better to have an error message that says
DEFAULT_URL_HOST and DEFAULT_EMAIL_HOST need to be set - but that's probably
something for upstream.
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=829715https://bugzilla.novell.com/show_bug.cgi?id=829715#c0
Summary: Translation for "Education" program group and program
"Virtual globe"
Classification: openSUSE
Product: openSUSE Factory
Version: 13.1 Milestone 3
Platform: x86-64
OS/Version: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: KDE4 Workspace
AssignedTo: kde-maintainers(a)suse.de
ReportedBy: asv(a)lumo.de
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: No
Created an attachment (id=548179)
--> (http://bugzilla.novell.com/attachment.cgi?id=548179)
"Education" not translated
"Education" program group as well as "Virtual globe" program name in k-menu is
not translated.
See screenshot (german version)
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=815161https://bugzilla.novell.com/show_bug.cgi?id=815161#c0
Summary: mount --no-canonical no longer works for output from
'mount"; (but does for df)
Classification: openSUSE
Product: openSUSE Factory
Version: 13.1 Milestone 0
Platform: x86-64
OS/Version: SUSE Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Basesystem
AssignedTo: bnc-team-screening(a)forge.provo.novell.com
ReportedBy: suse(a)tlinx.org
QAContact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.28)
Gecko/20120306 Firefox/3.6.28
When I use the no-canonical option in mount, it should take a
dev-mapper file like this:
/dev/mapper/HnS-Media_Back
and change the display device name to
/dev/HnS/Media_Back (which is what is listed in /etc/fstab).
When I display this with mount, this no longer works.
Maybe Mount no longer dispays values from /etc/mtab as it should:
The programs mount and umount maintain a list of currently
mounted filesystems in the file /etc/mtab. If no arguments are
given to mount, this list is printed.
Reproducible: Always
Steps to Reproduce:
1. put a lvh volume in fstab by it's given name /dev/VolGroup/LogVolName in
fstab.
2. Mount it with and without the --no-canonical
3. Try remounting it with "-f" as described in the man page:
--no-canonicalize
Don't canonicalize paths. The mount command canonicalizes all
paths (from command line or fstab) and stores canonicalized
paths to the /etc/mtab file. This option can be used together
with the -f flag for already canonicalized absolut paths.
Actual Results:
the canonical name with "mapper" and dashes instead of slashes and double
slashes instead of slashes, is shown in the mount command.
Note:
the "df" command shows the canonical name!!
Expected Results:
mount should display values from /etc/mtab not /proc/mounts.
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.