http://bugzilla.opensuse.org/show_bug.cgi?id=1200138
Andreas Stieger <Andreas.Stieger(a)gmx.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|Basesystem |Upgrade Problems
QA Contact|qa-bugs(a)suse.de |jsrain(a)suse.com
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1200140
Bug ID: 1200140
Summary: 5.24.90, screen lock fail
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.3
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: KDE Workspace (Plasma)
Assignee: opensuse-kde-bugs(a)opensuse.org
Reporter: epistemepromeneur(a)free.fr
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Yesterday there was an update of plasma.
Result: manually or automatically when the screen is locked, we get a message
saying locking failed, please open a text console with Ctrl_Alt_F2 then login
then execute "loginctl unlock-session 2" then etc.
KDE team says "it's up to your distro"
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1200076https://bugzilla.suse.com/show_bug.cgi?id=1200076#c7
--- Comment #7 from Stefan Dirsch <sndirsch(a)suse.com> ---
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/bin/X :0 -seat seat0 -auth /run/lightdm/root/:0
-nolisten tcp vt7 -novtswi'.
Program terminated with signal SIGABRT, Aborted.
#0 0x00007f30f2ba0cdb in raise () from /lib64/libc.so.6
[Current thread is 1 (Thread 0x7f30f546e180 (LWP 4220))]
Missing separate debuginfos, use: zypper install
glibc-debuginfo-2.31-150300.26.5.x86_64
(gdb) bt
#0 0x00007f30f2ba0cdb in raise () from /lib64/libc.so.6
#1 0x00007f30f2ba2375 in abort () from /lib64/libc.so.6
#2 0x000055f8795b8f1a in OsAbort () at utils.c:1350
#3 0x000055f8795bea63 in AbortServer () at log.c:879
#4 0x000055f8795bf885 in FatalError (
f=f@entry=0x55f8795efbd0 "Caught signal %d (%s). Server aborting\n")
at log.c:1017
#5 0x000055f8795b5fb3 in OsSigHandler (signo=11, sip=<optimized out>,
unused=<optimized out>) at osinit.c:156
#6 <signal handler called>
#7 _XkbSetMapChecks (client=client@entry=0x55f87ca18080,
req=req@entry=0x55f87ca3cd40, values=values@entry=0x55f87ca3cd64 "",
dev=<optimized out>) at xkb.c:2487
#8 0x000055f879559adf in ProcXkbSetMap (client=0x55f87ca18080) at xkb.c:2760
#9 0x000055f87945cd78 in Dispatch () at dispatch.c:478
#10 0x000055f879460d7c in dix_main (argc=10, argv=0x7fffa66aaa08,
envp=<optimized out>) at main.c:280
#11 0x00007f30f2b8b2bd in __libc_start_main () from /lib64/libc.so.6
#12 0x000055f87944aa1a in _start () at ../sysdeps/x86_64/start.S:120
(gdb) quit
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1199858
Bug ID: 1199858
Summary: Budgie applet (budgie-applications-menu-applet)
crashes session when added to panel
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: x86-64
OS: openSUSE Tumbleweed
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Other
Assignee: screening-team-bugs(a)suse.de
Reporter: edenfall_matt(a)hotmail.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
The budgie-applications-menu-applet crashes Budgie when adding the app to a
Budgie panel. Snapper rollback is required to get a working session again.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1196682https://bugzilla.suse.com/show_bug.cgi?id=1196682#c14
--- Comment #14 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2022:1910-1: An update that solves 27 vulnerabilities and has three
fixes is now available.
Category: security (important)
Bug References:
1072087,1072090,1072108,1072111,1093641,1093649,1093653,1093655,1093657,1101471,1101474,1101493,1101495,1102175,1109166,1109167,1109168,1109564,1109565,1109566,1109567,1109568,1109569,1109570,1167401,1167404,1167405,1174439,1179521,1196682
CVE References:
CVE-2017-17505,CVE-2017-17506,CVE-2017-17508,CVE-2017-17509,CVE-2018-11202,CVE-2018-11203,CVE-2018-11204,CVE-2018-11206,CVE-2018-11207,CVE-2018-13869,CVE-2018-13870,CVE-2018-14032,CVE-2018-14033,CVE-2018-14460,CVE-2018-17233,CVE-2018-17234,CVE-2018-17237,CVE-2018-17432,CVE-2018-17433,CVE-2018-17434,CVE-2018-17435,CVE-2018-17436,CVE-2018-17437,CVE-2018-17438,CVE-2020-10809,CVE-2020-10810,CVE-2020-10811
JIRA References:
Sources used:
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):
hdf5_1_10_8-gnu-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150200.8.4.3,
hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150200.8.4.2
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):
hdf5_1_10_8-gnu-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150200.8.4.3,
hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150200.8.4.2
NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1179521https://bugzilla.suse.com/show_bug.cgi?id=1179521#c22
--- Comment #22 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2022:1910-1: An update that solves 27 vulnerabilities and has three
fixes is now available.
Category: security (important)
Bug References:
1072087,1072090,1072108,1072111,1093641,1093649,1093653,1093655,1093657,1101471,1101474,1101493,1101495,1102175,1109166,1109167,1109168,1109564,1109565,1109566,1109567,1109568,1109569,1109570,1167401,1167404,1167405,1174439,1179521,1196682
CVE References:
CVE-2017-17505,CVE-2017-17506,CVE-2017-17508,CVE-2017-17509,CVE-2018-11202,CVE-2018-11203,CVE-2018-11204,CVE-2018-11206,CVE-2018-11207,CVE-2018-13869,CVE-2018-13870,CVE-2018-14032,CVE-2018-14033,CVE-2018-14460,CVE-2018-17233,CVE-2018-17234,CVE-2018-17237,CVE-2018-17432,CVE-2018-17433,CVE-2018-17434,CVE-2018-17435,CVE-2018-17436,CVE-2018-17437,CVE-2018-17438,CVE-2020-10809,CVE-2020-10810,CVE-2020-10811
JIRA References:
Sources used:
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):
hdf5_1_10_8-gnu-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150200.8.4.3,
hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150200.8.4.2
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):
hdf5_1_10_8-gnu-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150200.8.4.3,
hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150200.8.4.2,
hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150200.8.4.2
NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1200131
Bug ID: 1200131
Summary: s390-tools build fails with gcc12
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: S/390-64
OS: openSUSE Tumbleweed
Status: NEW
Severity: Critical
Priority: P5 - None
Component: Basesystem
Assignee: screening-team-bugs(a)suse.de
Reporter: mpost(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
While trying to update s390-tools to conform to the usrmerge change, the build
fails with the following error:
gcc -I ../../include -D_GNU_SOURCE -fno-pie -Os -g -I../..//zipl/boot
-I../..//zipl/include -I../..//include -DENABLE_SCLP_ASCII=1
-DS390_TOOLS_RELEASE=2.19.0-324.1 -fno-builtin -ffreestanding
-fno-asynchronous-unwind-tables -fno-delete-null-pointer-checks
-fno-stack-protector -fexec-charset=IBM1047 -m64 -mpacked-stack
-mstack-size=4096 -mstack-guard=128 -msoft-float -Wall -Wformat-security
-Wextra -Werror -c stage3a.c -o stage3a.o
In file included from stage3a.c:14:
In function '__test_facility',
inlined from 'test_facility' at ../../include/boot/s390.h:428:9,
inlined from 'start' at stage3a.c:42:7:
../../include/boot/s390.h:418:17: error: array subscript 0 is outside array
bounds of 'void[0]' [-Werror=array-bounds]
418 | return (*ptr & (0x80 >> (nr & 7))) != 0;
| ^~~~
cc1: all warnings being treated as errors
make[2]: *** [../../common.mak:268: stage3a.o] Error 1
make[2]: Leaving directory
'/home/abuild/rpmbuild/BUILD/s390-tools-2.19.0/genprotimg/boot'
make[1]: *** [Makefile:22: all-recursive] Error 1
make: *** [Makefile:51: genprotimg] Error 2
The failure can be seen in both
https://build.opensuse.org/package/show/home:markkp:branches:Base:System/s3…
and https://build.opensuse.org/package/show/Base:System/s390-tools
The last successful build was on May 11, 2022. From what I can tell, that build
was performed with gcc11, so it appears that gcc12 is detecting something that
previous versions did not.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1199193https://bugzilla.suse.com/show_bug.cgi?id=1199193#c1
Holger Sickenberg <holgi(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|P5 - None |P2 - High
CC| |lubos.kocman(a)suse.com
Found By|--- |Community User
--- Comment #1 from Holger Sickenberg <holgi(a)suse.com> ---
I'm running into same issue. Either pyopenssl need to be in lower version or
cryptography>=3.2
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1200125
Maintenance Robot <maint-coord+maintenance_robot(a)suse.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|P5 - None |P4 - Low
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1200124
Maintenance Robot <maint-coord+maintenance_robot(a)suse.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|P5 - None |P3 - Medium
--
You are receiving this mail because:
You are on the CC list for the bug.