http://bugzilla.novell.com/show_bug.cgi?id=597673http://bugzilla.novell.com/show_bug.cgi?id=597673#c0
Summary: fetchmail: DoS in -v -v mode in multibyte
Classification: openSUSE
Product: openSUSE 11.3
Version: Factory
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Security
AssignedTo: puzel(a)novell.com
ReportedBy: lnussel(a)novell.com
QAContact: qa(a)suse.de
CC: security-team(a)suse.de
Found By: Other
Blocker: ---
Your friendly security team received the following report via oss-security.
Please respond ASAP.
The issue is public.
Factory only sufficient
------------------------------------------------------------------------------
Date: Sun, 18 Apr 2010 18:58:30 +0200
From: "Matthias Andree" <matthias.andree(a)gmx.de>
Subject: [oss-security] CVE request: fetchmail 4.6.3...6.3.16 DoS in -v -v mode
in multibyte
locales on invalid input
Please assign a CVE id for the issue described below. (Best viewed in
non-proportional font with 8 space tabs):
Draft announcement:
- DRAFT - XXX - DRAFT -
fetchmail-SA-2010-02: Denial of service in debug mode w/ multichar locales
Topics: Denial of service in debug output.
Author: Matthias Andree
Version: 0.1 XXX
Announced: XXX
Type: malloc() Buffer overrun with printable characters
Impact: Denial of service.
Danger: low
CVE Name: CVE-2010-XXXX
CVSSv2: XXX
URL: http://www.fetchmail.info/fetchmail-SA-2010-02.txt
Project URL: http://www.fetchmail.info/
Affects: fetchmail releases 4.6.3 up to and including 6.3.16
Not affected: fetchmail release 6.3.17 and newer
Corrected: 2010-04-18 Git (XXX)
0. Release history
==================
2010-04-18 0.1 first draft (visible in SVN and through oss-security)
XXX
1. Background
=============
fetchmail is a software package to retrieve mail from remote POP2, POP3,
IMAP, ETRN or ODMR servers and forward it to local SMTP, LMTP servers or
message delivery agents. It supports SSL and TLS security layers through
the OpenSSL library, if enabled at compile time and if also enabled at
run time.
2. Problem description and Impact
=================================
In debug mode (-v -v), fetchmail prints information that was obtained from
the
upstream server (POP3 UIDL lists) or from message headers retrieved from
it.
If printing such information fails, for instance because there are
invalid
multibyte character sequences in this information (message headers),
fetchmail
will misinterpret this condition, and believe that the buffer was too
small,
and reallocate a bigger one (with linearly increasing buffer size), and
repeat,
until the allocation fails. At that point, fetchmail will abort.
Note that the "Affects:" line above may be inaccurate, and it may be that
versions before 5.6.6 are actually unaffected. The author was unable to
compile such old fetchmail versions to verify the existence of the bug.
Given that other security issues are present in such versions, those
should
not be used, and the wider version range was listed as vulnerable to err
towards the safe.
3. Solution
===========
There are two alternatives, either of them by itself is sufficient:
a. Apply the patch found in section B of this announcement to
fetchmail 6.3.14 or newer, recompile and reinstall it.
b. Install fetchmail 6.3.17 or newer after it will have become available.
The fetchmail source code is always available from
<http://developer.berlios.de/project/showfiles.php?group_id=1824>.
4. Workaround
=============
Run fetchmail with at most one -v (--verbose) option.
A. Copyright, License and Warranty
==================================
(C) Copyright 2010 by Matthias Andree, <matthias.andree(a)gmx.de>.
Some rights reserved.
This work is licensed under the Creative Commons
Attribution-Noncommercial-No Derivative Works 3.0 Germany License.
To view a copy of this license, visit
http://creativecommons.org/licenses/by-nc-nd/3.0/de/ or send a letter to
Creative Commons
171 Second Street
Suite 300
SAN FRANCISCO, CALIFORNIA 94105
USA
THIS WORK IS PROVIDED FREE OF CHARGE AND WITHOUT ANY WARRANTIES.
Use the information herein at your own risk.
B. Patch to remedy the problem
==============================
Note that when taking this from a GnuPG clearsigned file, the lines
starting with a "-" character are prefixed by another "- " (dash +
blank) combination. Either feed this file through GnuPG to strip them,
or strip them manually. You may want to use the "-p1" flag to patch.
Whitespace differences can usually be ignored by invoking "patch -l",
so try this if the patch does not apply.
diff --git a/rfc822.c b/rfc822.c
index 6f2dbf3..dbcda32 100644
--- a/rfc822.c
+++ b/rfc822.c
@@ -25,6 +25,7 @@ MIT license. Compile with -DMAIN to build the
demonstrator.
#include <stdlib.h>
#include "fetchmail.h"
+#include "sdump.h"
#ifndef MAIN
#include "i18n.h"
@@ -74,9 +75,10 @@ char *reply_hack(
}
#ifndef MAIN
- if (outlevel >= O_DEBUG)
- report_build(stdout, GT_("About to rewrite %.*s...\n"),
- (int)BEFORE_EOL(buf), buf);
+ if (outlevel >= O_DEBUG) {
+ report_build(stdout, GT_("About to rewrite %s...\n"), (cp = sdump(buf,
BEFORE_EOL(buf))));
+ xfree(cp);
+ }
/* make room to hack the address; buf must be malloced */
for (cp = buf; *cp; cp++)
@@ -211,9 +213,12 @@ char *reply_hack(
}
#ifndef MAIN
- if (outlevel >= O_DEBUG)
- report_complete(stdout, GT_("...rewritten version is %.*s.\n"),
- (int)BEFORE_EOL(buf), buf);
+ if (outlevel >= O_DEBUG) {
+ report_complete(stdout, GT_("...rewritten version is %s.\n"),
+ (cp = sdump(buf, BEFORE_EOL(buf))));
+ xfree(cp)
+ }
+
#endif /* MAIN */
*length = strlen(buf);
return(buf);
diff --git a/uid.c b/uid.c
index fdc6f5d..d813bee 100644
--- a/uid.c
+++ b/uid.c
@@ -20,6 +20,7 @@
#include "fetchmail.h"
#include "i18n.h"
+#include "sdump.h"
/*
* Machinery for handling UID lists live here. This is mainly to support
@@ -260,8 +261,11 @@ void initialize_saved_lists(struct query *hostlist,
const char *idfile)
if (uidlcount)
{
report_build(stdout, GT_("Scratch list of UIDs:"));
- for (idp = scratchlist; idp; idp = idp->next)
- report_build(stdout, " %s", idp->id);
+ for (idp = scratchlist; idp; idp = idp->next) {
+ char *t = sdump(idp->id, strlen(idp->id));
+ report_build(stdout, " %s", t);
+ free(t);
+ }
if (!idp)
report_build(stdout, GT_(" <empty>"));
report_complete(stdout, "\n");
@@ -517,8 +521,11 @@ void uid_swap_lists(struct query *ctl)
report_build(stdout, GT_("Merged UID list from %s:"),
ctl->server.pollname);
else
report_build(stdout, GT_("New UID list from %s:"),
ctl->server.pollname);
- for (idp = dofastuidl ? ctl->oldsaved : ctl->newsaved; idp; idp =
idp->next)
- report_build(stdout, " %s = %d", idp->id, idp->val.status.mark);
+ for (idp = dofastuidl ? ctl->oldsaved : ctl->newsaved; idp; idp =
idp->next) {
+ char *t = sdump(idp->id, strlen(idp->id));
+ report_build(stdout, " %s = %d", t, idp->val.status.mark);
+ free(t);
+ }
if (!idp)
report_build(stdout, GT_(" <empty>"));
report_complete(stdout, "\n");
@@ -567,8 +574,11 @@ void uid_discard_new_list(struct query *ctl)
/* this is now a merged list! the mails which were seen in this
* poll are marked here. */
report_build(stdout, GT_("Merged UID list from %s:"),
ctl->server.pollname);
- for (idp = ctl->oldsaved; idp; idp = idp->next)
- report_build(stdout, " %s = %d", idp->id, idp->val.status.mark);
+ for (idp = ctl->oldsaved; idp; idp = idp->next) {
+ char *t = sdump(idp->id, strlen(idp->id));
+ report_build(stdout, " %s = %d", t, idp->val.status.mark);
+ free(t);
+ }
if (!idp)
report_build(stdout, GT_(" <empty>"));
report_complete(stdout, "\n");
--
Matthias Andree
--
Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=921570
Bug ID: 921570
Summary: after dist upgrade system boots to emergency mode
Classification: openSUSE
Product: openSUSE Distribution
Version: 13.2
Hardware: x86-64
OS: SUSE Other
Status: NEW
Severity: Major
Priority: P5 - None
Component: Kernel
Assignee: kernel-maintainers(a)forge.provo.novell.com
Reporter: steffen.hau(a)rz.uni-mannheim.de
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
I've started upgrading systems from openSUSE 13.1 to 13.2. Virtual machines
without special stuff like mdadm raid devices oder multipathed FC LUN's went
fine.
But systems (IBM HS22 Blades) with mdadm raid devices are booting to emergency
mode. The systems have three raid 1 devices (swap, / and /srv or /home), swap
and / are correctly assembled but the third md device is missing and it also
does not appear in /proc/mdstat. Manually running "mdadm -A --scan" brings it
up and "systemctl default" continues booting. To dig deeper into this issue,
I've installed openSUSE 13.2 from scratch on a spare blade and here md2 is
correctly assembled.
This is the content of /etc/systemd/system/ of the upgraded system:
/etc/systemd/system/dbus-org.opensuse.Network.AUTO4.service
/etc/systemd/system/dbus-org.opensuse.Network.DHCP4.service
/etc/systemd/system/dbus-org.opensuse.Network.DHCP6.service
/etc/systemd/system/dbus-org.opensuse.Network.Nanny.service
/etc/systemd/system/default.target
/etc/systemd/system/default.target.wants/sysstat.service
/etc/systemd/system/default.target.wants/systemd-readahead-collect.service
/etc/systemd/system/default.target.wants/systemd-readahead-replay.service
/etc/systemd/system/getty.target.wants/getty(a)tty1.service
/etc/systemd/system/multi-user.target.wants/acpid.service
/etc/systemd/system/multi-user.target.wants/apache2.service
/etc/systemd/system/multi-user.target.wants/auditd.service
/etc/systemd/system/multi-user.target.wants/cron.service
/etc/systemd/system/multi-user.target.wants/dsmc.service
/etc/systemd/system/multi-user.target.wants/irqbalance.service
/etc/systemd/system/multi-user.target.wants/mcelog.service
/etc/systemd/system/multi-user.target.wants/ntpd.service
/etc/systemd/system/multi-user.target.wants/postfix.service
/etc/systemd/system/multi-user.target.wants/remote-fs.target
/etc/systemd/system/multi-user.target.wants/smartd.service
/etc/systemd/system/multi-user.target.wants/sshd.service
/etc/systemd/system/multi-user.target.wants/syslog-ng.service
/etc/systemd/system/multi-user.target.wants/wicked.service
/etc/systemd/system/network-online.target.wants/wicked.service
/etc/systemd/system/network.service
/etc/systemd/system/sysinit.target.wants/multipathd.service
/etc/systemd/system/syslog.service
/etc/systemd/system/system-update.target.wants/systemd-readahead-drop.service
/etc/systemd/system/timers.target.wants/logrotate.timer
/etc/systemd/system/wickedd.service.wants/wickedd-auto4.service
/etc/systemd/system/wickedd.service.wants/wickedd-dhcp4.service
/etc/systemd/system/wickedd.service.wants/wickedd-dhcp6.service
/etc/systemd/system/wickedd.service.wants/wickedd-nanny.service
/etc/systemd/system/wicked.service.wants/wickedd.service
I've made the scratch system identical to the problematic system (identical
installed packages, conf files in /etc, active systemd services, and so on) and
it still assembles md2. I've no more ideas where to search for possible causes.
Please let me know what kind of information I should provide in order to help
you to find the cause.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=911512
Bug ID: 911512
Summary: opensuse boots to terminal
Classification: openSUSE
Product: openSUSE Distribution
Version: 13.2
Hardware: Other
OS: Other
Status: NEW
Severity: Critical
Priority: P5 - None
Component: Basesystem
Assignee: bnc-team-screening(a)forge.provo.novell.com
Reporter: illumilore(a)gmail.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:34.0) Gecko/20100101
Firefox/34.0
Build Identifier:
after an update, opensuse now boots to a terminal. trying to use the command
startx gives the output that it cannot open /dev/tty0 no such file or
directory.
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=735865https://bugzilla.novell.com/show_bug.cgi?id=735865#c0
Summary: add BuildRequires: python-cups to printer driver
packages
Classification: openSUSE
Product: openSUSE 12.1
Version: Final
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Printing
AssignedTo: jsmeix(a)suse.com
ReportedBy: lnussel(a)suse.com
QAContact: jsmeix(a)suse.com
Found By: ---
Blocker: ---
all printer driver packages should have
BuildRequires: python-cups
python-cups installs special rpm macros that adds Provides tags for the printer
drivers supported by the package.
See gutenprint for an example how the resulting rpm looks like.
See also bug 735864
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=960739
Bug ID: 960739
Summary: OpenStack nova ends with traceback when connecting to
server with custom SUSE certificate
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: 2015*
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Other
Assignee: bnc-team-screening(a)forge.provo.novell.com
Reporter: mnowak(a)suse.com
QA Contact: qa-bugs(a)suse.de
CC: mkravec(a)suse.com, pgonin(a)suse.com
Found By: ---
Blocker: ---
I try to connect to cloud.suse.de on Tumbleweed but I end up with traceback:
$ nova --debug image-list
DEBUG (session:198) REQ: curl -g -i -X GET
https://dashboardp2.cloud.suse.de:5000/v2.0/ -H "Accept: application/json" -H
"User-Agent: python-keystoneclient"
INFO (connectionpool:756) Starting new HTTPS connection (1):
dashboardp2.cloud.suse.de
WARNING (base:143) Discovering versions from the identity service failed when
creating the password plugin. Attempting to determine version from URL.
DEBUG (v2:86) Making authentication request to
https://dashboardp2.cloud.suse.de:5000/v2.0/tokens
INFO (connectionpool:756) Starting new HTTPS connection (2):
dashboardp2.cloud.suse.de
DEBUG (shell:905) SSL exception connecting to
https://dashboardp2.cloud.suse.de:5000/v2.0/tokens: [SSL:
CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:590)
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/novaclient/shell.py", line 903, in
main
OpenStackComputeShell().main(argv)
File "/usr/lib/python2.7/site-packages/novaclient/shell.py", line 737, in
main
api_version = api_versions.discover_version(self.cs, api_version)
File "/usr/lib/python2.7/site-packages/novaclient/api_versions.py", line 253,
in discover_version
client)
File "/usr/lib/python2.7/site-packages/novaclient/api_versions.py", line 235,
in _get_server_version_range
version = client.versions.get_current()
File "/usr/lib/python2.7/site-packages/novaclient/v2/versions.py", line 62,
in get_current
return self._get_current()
File "/usr/lib/python2.7/site-packages/novaclient/v2/versions.py", line 43,
in _get_current
url = self.api.client.get_endpoint().rsplit("/", 1)[0]
File "/usr/lib/python2.7/site-packages/keystoneclient/adapter.py", line 129,
in get_endpoint
return self.session.get_endpoint(auth or self.auth, **kwargs)
File "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 660,
in get_endpoint
return auth.get_endpoint(self, **kwargs)
File "/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/base.py",
line 315, in get_endpoint
service_catalog = self.get_access(session).service_catalog
File "/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/base.py",
line 240, in get_access
self.auth_ref = self.get_auth_ref(session)
File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/generic/base.py",
line 186, in get_auth_ref
return self._plugin.get_auth_ref(session, **kwargs)
File "/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v2.py",
line 88, in get_auth_ref
authenticated=False, log=False)
File "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 501,
in post
return self.request(url, 'POST', **kwargs)
File "/usr/lib/python2.7/site-packages/keystoneclient/utils.py", line 337, in
inner
return func(*args, **kwargs)
File "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 386,
in request
resp = send(**kwargs)
File "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 424,
in _send_request
raise exceptions.SSLError(msg)
SSLError: SSL exception connecting to
https://dashboardp2.cloud.suse.de:5000/v2.0/tokens: [SSL:
CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:590)
ERROR (SSLError): SSL exception connecting to
https://dashboardp2.cloud.suse.de:5000/v2.0/tokens: [SSL:
CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:590)
Packages:
python-openstackclient-1.7.1-1.1.noarch
python-novaclient-2.30.1-1.1.noarch
python-neutronclient-3.1.0-1.1.noarch
python-glanceclient-1.1.0-1.1.noarch
python-cinderclient-1.4.0-1.1.noarch
python-troveclient-1.3.0-1.1.noarch
python-keystoneclient-1.7.2-1.1.noarch
python-swiftclient-2.6.0-1.1.noarch
python-heatclient-0.8.0-1.1.noarch
python-ceilometerclient-1.5.0-1.1.noarch
python-saharaclient-0.11.1-1.1.noarch
ca-certificates-suse-1.0-5.1.noarch
*-openrc.sh file is properly sourced in the terminal.
`nova --insecure image-list` works but prints a lot of InsecureRequestWarning
warnings.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=927743
Bug ID: 927743
Summary: Loading screen not displaying correctly
Classification: openSUSE
Product: openSUSE Factory
Version: 201503*
Hardware: x86-64
OS: Other
Status: NEW
Severity: Minor
Priority: P5 - None
Component: Basesystem
Assignee: bnc-team-screening(a)forge.provo.novell.com
Reporter: gerharddeclercq(a)outlook.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
I am on Tumbleweed and the loading screen (three green blocks) are not
displaying correctly on my machine (Thinkpad Yoga S1). They displayed correctly
on 13.2. They are now just blocks of strange green characters that I do not
recognize.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=969142
Bug ID: 969142
Summary: games:tools/springlobby: Bug
Classification: openSUSE
Product: openSUSE.org
Version: unspecified
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: 3rd party software
Assignee: matthias(a)mailaender.name
Reporter: smithjd15(a)gmail.com
QA Contact: opensuse-communityscreening(a)forge.provo.novell.com
CC: opensuse(a)dstoecker.de
Found By: ---
Blocker: ---
Hard runtime dependencies for springlobby that aren't pulled in:
libwx_baseu_net-suse1
libwx_gtk2u_qa-suse1
libwx_gtk2u_adv-suse1
libwx_gtk2u_aui-suse1
springlobby also complains about libdumb, but still runs.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=915483
Bug ID: 915483
Summary: a2ps:/etc/a2ps.cfg:220: invalid option `variable:'
Classification: openSUSE
Product: openSUSE Factory
Version: 201501*
Hardware: x86-64
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Basesystem
Assignee: bnc-team-screening(a)forge.provo.novell.com
Reporter: gp(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Created attachment 621418
--> http://bugzilla.suse.com/attachment.cgi?id=621418&action=edit
Patch that fixes the configuration file
Using a2ps on a simple text file, with a2ps-4.14-1.1.x86_64 I get
% a2ps -o x.ps x
a2ps:/etc/a2ps.cfg:220: invalid option `variable:'
% ll /etc/a2ps.cfg
-rw-r--r-- 1 root root 15964 Dez 16 17:42 /etc/a2ps.cfg
`rpm -V a2ps` indicates I have the vanilla version of that file,
and indeed I never changed anything.
This seems to be due to a spelling of "variable" (lowercase) vs
"Variable", and can be fixed as follows (see attached patch):
-variable: ghostview a2ps-open
+Variable: ghostview a2ps-open
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=917728
Bug ID: 917728
Summary: Obsolete/deprecated config option still enabled
Classification: openSUSE
Product: openSUSE Factory
Version: 201502*
Hardware: x86-64
OS: SUSE Other
Status: NEW
Severity: Enhancement
Priority: P5 - None
Component: Kernel
Assignee: kernel-maintainers(a)forge.provo.novell.com
Reporter: zaitor(a)opensuse.org
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Hi Kernel people.
Just installed the spiffy new 3.19 kernel from Kernel:stable, and when going
through journald logs to see if there was something new and exciting I came
over these warnings that I've seen for ages, but never cared for since it seem
to do no harm.
linux-ial4:~ # uname -r
3.19.0-1.g8a7d5f9-desktop
linux-ial4:~ # journalctl -b | grep CONFIG_ACPI_PROCFS_POWER
feb. 13 00:27:50 linux-ial4 kernel: ACPI: Deprecated procfs I/F for battery is
loaded, please retry with CONFIG_ACPI_PROCFS_POWER cleared
feb. 13 00:27:50 linux-ial4 kernel: ACPI: Deprecated procfs I/F for battery is
loaded, please retry with CONFIG_ACPI_PROCFS_POWER cleared
feb. 13 00:27:50 linux-ial4 kernel: ACPI: Deprecated procfs I/F for AC is
loaded, please retry with CONFIG_ACPI_PROCFS_POWER cleared
linux-ial4:~ #
----
But today I took the time to google it, and found this bug from Arch
https://bugs.archlinux.org/task/25845
Snip from bug
ACPI: Deprecated procfs I/F for battery is loaded, please retry with
CONFIG_ACPI_PROCFS_POWER cleared
This was scheduled for removal in 2.6.39, but is still there. I suggest trying
to disable it for 3.1, if for nothing else than to discover what problems this
might cause so the appropriate bug reports can be filed.
>From Documentation/feature-removal-schedule.txt:
What: CONFIG_ACPI_PROCFS_POWER
When: 2.6.39
Why: sysfs I/F for ACPI power devices, including AC and Battery, has been
working in upstream kernel since 2.6.24, Sep 2007. In 2.6.37, we make the sysfs
I/F always built in and this option disabled by default. Remove this option and
the ACPI power procfs interface in 2.6.39.
Who: Zhang Rui <rui.zhang(a)intel.com>
----
Short story this was disabled on Arch back in 2011
Could we do this for openSUSE too?
--
You are receiving this mail because:
You are on the CC list for the bug.