http://bugzilla.suse.com/show_bug.cgi?id=1096916
Bug ID: 1096916
Summary: enlightenment_askpass causes X crash
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.0
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: X11 Applications
Assignee: bnc-team-screening(a)forge.provo.novell.com
Reporter: nmoreychaisemartin(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Created attachment 773412
--> http://bugzilla.suse.com/attachment.cgi?id=773412&action=edit
Full log
Running on an updated Leap 15.0
$ rpm -q libecore1 libeina1 enlightenment libelementary1 libeo1 libevas1
libecore1-1.20.7-lp150.5.9.x86_64
libeina1-1.20.7-lp150.5.9.x86_64
enlightenment-0.22.3-lp150.2.1.x86_64
libelementary1-1.20.7-lp150.5.9.x86_64
libeo1-1.20.7-lp150.5.9.x86_64
libevas1-1.20.7-lp150.5.9.x86_64
Running enlightenment_askpass works fine.
But when started through git imap-send this happens:
git format-patch -M --to linux-rdma(a)vger.kernel.org --subject-prefix="PATCH
rdma-core" --stdout origin/master | git imap-send
ERR<14561>:ecore_evas
modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c:2340
_ecore_evas_wl_common_new_internal() Failed to connect to Wayland Display
(null)
## Copy & Paste the below (until EOF) into a terminal, then hit Enter
eina_btlog << EOF
/usr/lib64/libeina.so.1 0x7fd5b5af523c 0x7fd5b5acc000
/usr/lib64/libeina.so.1 0x7fd5b5af5f61 0x7fd5b5acc000
/usr/lib64/libeina.so.1 0x7fd5b5af7333 0x7fd5b5acc000
/usr/lib64/ecore_evas/engines/wayland/v-1.20/module.so 0x7fd5a814577a
0x7fd5a813d000
/usr/lib64/ecore_evas/engines/wayland/v-1.20/module.so 0x7fd5a81457f7
0x7fd5a813d000
/usr/lib64/libecore_evas.so.1 0x7fd5b6a9b397 0x7fd5b6a84000
/usr/lib64/libelementary.so.1 0x7fd5b93d7c13 0x7fd5b914c000
/usr/lib64/libelementary.so.1 0x7fd5b93d89f0 0x7fd5b914c000
/usr/lib64/libeo.so.1 0x7fd5b5f8e95e 0x7fd5b5f7e000
/usr/lib64/libeo.so.1 0x7fd5b5f86ffc 0x7fd5b5f7e000
/usr/lib64/libelementary.so.1 0x7fd5b93d26c2 0x7fd5b914c000
/usr/bin/enlightenment_askpass 0x55aa25b146cf 0x55aa25b13000
/usr/bin/enlightenment_askpass 0x55aa25b144dc 0x55aa25b13000
/lib64/libc.so.6 0x7fd5b86ddf4a 0x7fd5b86bd000
/usr/bin/enlightenment_askpass 0x55aa25b1451a 0x55aa25b13000
EOF
Full error log attached.
Note: This worked fined in Leap 42.3
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=993885
Bug ID: 993885
Summary: Kde-Live net installer does not reboot after
installation
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Live Medium
Assignee: fvogt(a)suse.com
Reporter: okurz(a)suse.com
QA Contact: okurz(a)suse.com
Found By: ---
Blocker: ---
## observation
Continuing through the whole installation process of the NET installer on the
Kde-Live medium until the "reboot now" dialog shows up works fine but the
reboot does not seem to happen
## steps to reproduce
I am in the process of automating this but it can be as easy as
* start Kde-Live
* call installation from within plasma session
* let installer run into "reboot now" action
* observe that the system does not reboot
## expected result
system should reboot into installed system
## workaround
manual reboot of the system yields a properly setup Tumbleweed installation so
the installation is ok.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1097779
Bug ID: 1097779
Summary: VUL-0: CVE-2018-12434: LibreSSL before 2.6.5 and 2.7.x
before 2.7.4 allows a memory-cache side-channelattack
on DSA and ECDSA signatures, aka the Return Of the
Hidden Number Problemor ROHNP. To discover a key, the
attacker needs access to
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 42.3
Hardware: Other
URL: https://smash.suse.de/issue/208302/
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Other
Assignee: jengelh(a)inai.de
Reporter: meissner(a)suse.com
QA Contact: security-team(a)suse.de
Found By: Security Response Team
Blocker: ---
CVE-2018-12434
LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel
attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem
or ROHNP. To discover a key, the attacker needs access to either the local
machine or a different virtual machine on the same physical host.
References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-12434https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txthttps://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=981004
Bug ID: 981004
Summary: Ensure template unit instances are deleted
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: All
OS: Linux
Status: NEW
Severity: Enhancement
Priority: P5 - None
Component: Basesystem
Assignee: jengelh(a)inai.de
Reporter: jengelh(a)inai.de
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
When a package is uninstalled, it will also be removed from the boot sequence,
by means of %preun generally calling %service_del_preun foo.service, which
expands to (among other things) `systemctl disable foo.service`.
To disable template instances such as foo(a)bar.service and foo(a)baz.service, one
can - and must, since "bar" and "baz" are not known at any time to the package
management system - use `systemctl disable foo@.service`, which will disable
all instances.
A number of packages are lacking the corresponding %service_del_preun
template@.service lines, which means template instance links like
foo(a)bar.service will stick around after package uninstall.
389-ds apache2 arpwatch autossh booth chrony cups device-mapper dracut envoy
freeipa govpn gpsd kmscon libteam lvm2 lvm2-clvm mariadb mdadm mgetty mysql
mysql-community-server openct openvpn parkverbot rear redis rfkill syncthing
system-config-printer systemd systemd-mini tomcat vpnc vsftpd wicked
xf86-input-wacom
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1133222
Bug ID: 1133222
Summary: openSUSE:Leap:15.1/hdf5:gnu-mpich-hpc failed
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.1
Hardware: Other
URL: https://build.opensuse.org/package/live_build_log/open
SUSE:Leap:15.1/hdf5:gnu-mpich-hpc/standard/x86_64
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Other
Assignee: eich(a)suse.com
Reporter: lnussel(a)suse.com
QA Contact: qa-bugs(a)suse.de
CC: adrian(a)suse.com
Found By: ---
Blocker: ---
openSUSE:Leap:15.1/hdf5:gnu-mpich-hpc failed to build. Please see build log:
https://build.opensuse.org/package/live_build_log/openSUSE:Leap:15.1/hdf5:g…
The job repeatedly gets stuck in
[ 2513s] Testing t_cache_image
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1153847
Bug ID: 1153847
Summary: Unable to boot with SecureBoot enabled in BIOS
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: x86-64
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Bootloader
Assignee: jsrain(a)suse.com
Reporter: imax(a)posteo.org
QA Contact: jsrain(a)suse.com
Found By: ---
Blocker: ---
I'm unable to do a fresh tumbleweed install with SecureBoot enabled. After
selecting usb device in boot menu i get a black screen not responding anymore.
Pushing Esc after some time leads to an error message with system freeze:
Failed to load image: Security Policy Violation
When i disable SecureBoot i can boot fine.To exclude possible mistakes:
- USB installer created with SUSE ImageWriter
- Checksums are all fine
- selected right entry in boot menu to boot usb-stick in UEFI mode
Other distro's (Ubuntu, Debian, Fedora) officially supporting SecureBoot are
working fine out of the box with SecureBoot enabled. With Leap i get the same
behavior as described above.
Is there something wrong with the signatures?
regards
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1131686
Bug ID: 1131686
Summary: openSUSE-2019-1163 security update for ldb break sssd
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.0
Hardware: 64bit
OS: Other
Status: NEW
Severity: Critical
Priority: P5 - None
Component: Samba
Assignee: samba-maintainers(a)SuSE.de
Reporter: pellice(a)gmail.com
QA Contact: samba-maintainers(a)SuSE.de
Found By: ---
Blocker: ---
After I applied the openSUSE-2019-1163 security update for ldb sssd service
crash at startup:
sssd[15186]:ldb: module version mismatch in
../source4/dsdb/samdb/ldb_modules/acl.c : ldb_version=1.2.4
module_version=1.2.3
sssd[15186]: ldb: failed to initialise module /usr/lib64/ldb/samba/acl.so :
Unavailable
sssd[15186]: ldb: failed to initialise module /usr/lib64/ldb/samba :
Unavailable
sssd: SSSD couldn't load the configuration database [5]: Input/output error.
I reverted it to previous version as a temporary workaround:
zypper in --oldpackage libldb1-1.2.3-lp150.2.3.1
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1131754
Bug ID: 1131754
Summary: sssd fails to start due to a ldb module version
mismatch (after installing updates on 2019-04-05)
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.0
Hardware: x86-64
OS: SUSE Other
Status: NEW
Severity: Critical
Priority: P5 - None
Component: Samba
Assignee: samba-maintainers(a)SuSE.de
Reporter: mhupfer(a)franken-online.de
QA Contact: samba-maintainers(a)SuSE.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101
Firefox/60.0
Build Identifier:
# rcsssd status
* sssd.service - System Security Services Daemon
Loaded: loaded (/usr/lib/systemd/system/sssd.service; enabled; vendor
preset: disabled)
Active: failed (Result: exit-code) since Sat 2019-04-06 11:23:34 CEST; 17min
ago
Process: 4985 ExecStart=/usr/sbin/sssd -i ${DEBUG_LOGGER} (code=exited,
status=4)
Main PID: 4985 (code=exited, status=4)
Apr 06 11:23:34 pcito20.leistritz.de systemd[1]: Starting System Security
Services Daemon...
Apr 06 11:23:34 pcito20.leistritz.de sssd[4985]: ldb: module version mismatch
in ../source4/dsdb/samdb/ldb_modules/acl.c : ldb_version=1.2.4
module_version=1.2.3
Apr 06 11:23:34 pcito20.leistritz.de sssd[4985]: ldb: failed to initialise
module /usr/lib64/ldb/samba/acl.so : Unavailable
Apr 06 11:23:34 pcito20.leistritz.de sssd[4985]: ldb: failed to initialise
module /usr/lib64/ldb/samba : Unavailable
Apr 06 11:23:34 pcito20.leistritz.de sssd[4985]: SSSD couldn't load the
configuration database [5]: Input/output error.
Apr 06 11:23:34 pcito20.leistritz.de systemd[1]: sssd.service: Main process
exited, code=exited, status=4/NOPERMISSION
Apr 06 11:23:34 pcito20.leistritz.de systemd[1]: Failed to start System
Security Services Daemon.
Apr 06 11:23:34 pcito20.leistritz.de systemd[1]: sssd.service: Unit entered
failed state.
Apr 06 11:23:34 pcito20.leistritz.de systemd[1]: sssd.service: Failed with
result 'exit-code'.
Reproducible: Always
Steps to Reproduce:
1. zypper up
2. reboot
3. verify sssd status
Actual Results:
sssd fails to start, domain users cannot log on!
Expected Results:
sssd starts successfully as it did before the update on Friday, April 5.
Previous "zypper up" run was roughly one week before.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1160249
Bug ID: 1160249
Summary: VNC issues (meta bug)
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: X.Org
Assignee: xorg-maintainer-bugs(a)forge.provo.novell.com
Reporter: sndirsch(a)suse.com
QA Contact: xorg-maintainer-bugs(a)forge.provo.novell.com
Found By: ---
Blocker: ---
VNC issues (meta bug)
--
You are receiving this mail because:
You are on the CC list for the bug.