https://bugzilla.suse.com/show_bug.cgi?id=1201111https://bugzilla.suse.com/show_bug.cgi?id=1201111#c3
Matej Cepl <mcepl(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |INVALID
--- Comment #3 from Matej Cepl <mcepl(a)suse.com> ---
Please, reopen, if you can make sense of this.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1201111https://bugzilla.suse.com/show_bug.cgi?id=1201111#c1
Matej Cepl <mcepl(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Flags| |needinfo?(asn(a)cryptomilk.or
| |g)
--- Comment #1 from Matej Cepl <mcepl(a)suse.com> ---
I completely, 100��%, don���t understand what you are talking about. Your own data
(search with zypper) contradicts what you are talking about (there is
python*-flufl.i18n doing just fine in TW).
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1201094
Bug ID: 1201094
Summary: packagekit does not respect forbidden or locked rpm
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Other
Assignee: screening-team-bugs(a)suse.de
Reporter: epistemepromeneur(a)free.fr
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
with Yast software manager i forbid the installation of some rpms.
Packagekit does not respect this and install the rpms.
More in yast software manager the icon stays "forbidden" instead of "installed"
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1201104
Bug ID: 1201104
Summary: Tumbleweed snapshot 20220630-0 breaks Calibre 5.44
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Major
Priority: P5 - None
Component: Other
Assignee: screening-team-bugs(a)suse.de
Reporter: timothyadams(a)ymail.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
On attempting to zypper dup from Tumbleweed snapshot 20220628-0 to 20220630-0,
I see:
Problem: the installed calibre-5.44.0-1.1.x86_64 requires
'libQt5Core.so.5(Qt_5.15.2_PRIVATE_API)(64bit)', but this requirement cannot be
provided
deleted providers: libQt5Core5-5.15.2+kde294-6.1.x86_64
Solution 1: Following actions will be done:
keep obsolete libQt5Core5-5.15.2+kde294-6.1.x86_64
keep obsolete libQt5Gui5-5.15.2+kde294-6.1.x86_64
keep obsolete libQt5DBus5-5.15.2+kde294-6.1.x86_64
Solution 2: deinstallation of calibre-5.44.0-1.1.x86_64
Solution 3: break calibre-5.44.0-1.1.x86_64 by ignoring some of its
dependencies
Choose from above solutions by number or cancel [1/2/3/c/d/?] (c):
Choosing 'Solution 2' would let the dup proceed normally, but I'd like to keep
using Calibre (if I can), so am filing this bug report.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1201105
Bug ID: 1201105
Summary: calibre-5.44.0-1.1.x86_64 installed requires
'libQt5Core.so.5(Qt_5.15.2_PRIVATE_API)(64bit)'
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: x86-64
OS: openSUSE Tumbleweed
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Other
Assignee: screening-team-bugs(a)suse.de
Reporter: stakanov(a)disroot.org
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Problema: calibre-5.44.0-1.1.x86_64 installato richiede
'libQt5Core.so.5(Qt_5.15.2_PRIVATE_API)(64bit)', ma non � possibile fornire
questo requisito
provider cancellati: libQt5Core5-5.15.2+kde294-6.1.x86_64
Soluzione 1: Verranno eseguite le azioni indicate:
mantieni libQt5Core5-5.15.2+kde294-6.1.x86_64 obsoleto
mantieni libQt5Gui5-5.15.2+kde294-6.1.x86_64 obsoleto
mantieni libQt5DBus5-5.15.2+kde294-6.1.x86_64 obsoleto
Soluzione 2: disinstallazione di calibre-5.44.0-1.1.x86_64
Soluzione 3: installa comunque calibre-5.44.0-1.1.x86_64 ignorando alcune
delle sue dipendenze
So calibre has the same problem as telegram had I think. Requirements may have
to be changed.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1201103
Maintenance Robot <maint-coord+maintenance_robot(a)suse.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|P5 - None |P3 - Medium
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1201103
Bug ID: 1201103
Summary: VUL-0: CVE-2022-24805, CVE-2022-24806, CVE-2022-24807,
CVE-2022-24808, CVE-2022-24809, CVE-2022-24810:
net-snmp: multiple memory handling issues
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.4
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Security
Assignee: abergmann(a)suse.com
Reporter: Andreas.Stieger(a)gmx.de
QA Contact: security-team(a)suse.de
Found By: ---
Blocker: ---
From https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES
- These two CVEs can be exploited by a user with read-only credentials:
- CVE-2022-24805 A buffer overflow in the handling of the INDEX of
NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
- CVE-2022-24809 A malformed OID in a GET-NEXT to the
nsVacmAccessTable
can cause a NULL pointer dereference.
- These CVEs can be exploited by a user with read-write credentials:
- CVE-2022-24806 Improper Input Validation when SETing malformed
OIDs in master agent and subagent simultaneously
- CVE-2022-24807 A malformed OID in a SET request to
SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an
out-of-bounds memory access.
- CVE-2022-24808 A malformed OID in a SET request to
NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
- CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable
can cause a NULL pointer dereference.
- To avoid these flaws, use strong SNMPv3 credentials and do not share
them.
If you must use SNMPv1 or SNMPv2c, use a complex community string
and enhance the protection by restricting access to a given IP address
range.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1199193
Holger Sickenberg <holgi(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |holgi(a)suse.com
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1200228https://bugzilla.suse.com/show_bug.cgi?id=1200228#c4
--- Comment #4 from Alexander Krupp <obs(a)akr.yagii.de> ---
If I may comment on comment #3:
I did not reopen the previous bug, because reproduction of bug 1195830 is not
possible anymore: the keystrokes leading to the bug are slightly different,
although the outcome seems quite similar.
However, I do not know whether bug 1195830 was resolved properly, because the
currently distributed ipython is 7.16.0 instead of 7.16.3 as suggested by
Benjamin Greiner in bug 1195830, comment 1, so it may be worth reopening.
The decision is beyond my expertise in this project, though.
--
You are receiving this mail because:
You are on the CC list for the bug.