[Bug 1093733] New: wireshark fails to build against Qt 5.11
http://bugzilla.suse.com/show_bug.cgi?id=1093733 Bug ID: 1093733 Summary: wireshark fails to build against Qt 5.11 Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: X11 Applications Assignee: lszhu@suse.com Reporter: fvogt@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- https://build.opensuse.org/package/live_build_log/openSUSE:Factory:Staging:L... [ 889s] packet_format_group_box.cpp: In constructor 'PacketFormatGroupBox::PacketFormatGroupBox(QWidget*)': [ 889s] packet_format_group_box.cpp:21:18: error: aggregate 'QStyleOption style_opt' has incomplete type and cannot be defined [ 889s] QStyleOption style_opt; Missing #includes. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1093733 http://bugzilla.suse.com/show_bug.cgi?id=1093733#c2 --- Comment #2 from Swamp Workflow Management <swamp@suse.de> --- This is an autogenerated message for OBS integration: This bug (1093733) was mentioned in https://build.opensuse.org/request/show/611551 Factory / wireshark -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1093733 http://bugzilla.suse.com/show_bug.cgi?id=1093733#c5 --- Comment #5 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:0693-1: An update that fixes 59 vulnerabilities is now available. Category: security (moderate) Bug References: 1093733,1094301,1101776,1101777,1101786,1101788,1101791,1101794,1101800,1101802,1101804,1101810,1106514,1111647,1117740,1121231,1121232,1121233,1121234,1121235,1127367,1127369,1127370,1131941,1131945,1136021,1141980,1150690,1156288,1158505,1161052,1165241,1165710,957624 CVE References: CVE-2018-11354,CVE-2018-11355,CVE-2018-11356,CVE-2018-11357,CVE-2018-11358,CVE-2018-11359,CVE-2018-11360,CVE-2018-11361,CVE-2018-11362,CVE-2018-12086,CVE-2018-14339,CVE-2018-14340,CVE-2018-14341,CVE-2018-14342,CVE-2018-14343,CVE-2018-14344,CVE-2018-14367,CVE-2018-14368,CVE-2018-14369,CVE-2018-14370,CVE-2018-16056,CVE-2018-16057,CVE-2018-16058,CVE-2018-18225,CVE-2018-18226,CVE-2018-18227,CVE-2018-19622,CVE-2018-19623,CVE-2018-19624,CVE-2018-19625,CVE-2018-19626,CVE-2018-19627,CVE-2018-19628,CVE-2019-10894,CVE-2019-10895,CVE-2019-10896,CVE-2019-10897,CVE-2019-10898,CVE-2019-10899,CVE-2019-10900,CVE-2019-10901,CVE-2019-10902,CVE-2019-10903,CVE-2019-13619,CVE-2019-16319,CVE-2019-19553,CVE-2019-5716,CVE-2019-5717,CVE-2019-5718,CVE-2019-5719,CVE-2019-5721,CVE-2019-9208,CVE-2019-9209,CVE-2019-9214,CVE-2020-7044,CVE-2020-9428,CVE-2020-9429,CVE-2020-9430,CVE-2020-9431 Sources used: SUSE Linux Enterprise Server for SAP 15 (src): libmaxminddb-1.4.2-1.3.1, spandsp-0.0.6-3.2.1, wireshark-3.2.2-3.35.2 SUSE Linux Enterprise Server 15-LTSS (src): libmaxminddb-1.4.2-1.3.1, spandsp-0.0.6-3.2.1, wireshark-3.2.2-3.35.2 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): spandsp-0.0.6-3.2.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP1 (src): spandsp-0.0.6-3.2.1, wireshark-3.2.2-3.35.2 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): libmaxminddb-1.4.2-1.3.1, spandsp-0.0.6-3.2.1, wireshark-3.2.2-3.35.2 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): libmaxminddb-1.4.2-1.3.1, spandsp-0.0.6-3.2.1, wireshark-3.2.2-3.35.2 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): libmaxminddb-1.4.2-1.3.1, spandsp-0.0.6-3.2.1, wireshark-3.2.2-3.35.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1093733 http://bugzilla.suse.com/show_bug.cgi?id=1093733#c6 --- Comment #6 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2020:0362-1: An update that fixes 59 vulnerabilities is now available. Category: security (moderate) Bug References: 1093733,1094301,1101776,1101777,1101786,1101788,1101791,1101794,1101800,1101802,1101804,1101810,1106514,1111647,1117740,1121231,1121232,1121233,1121234,1121235,1127367,1127369,1127370,1131941,1131945,1136021,1141980,1150690,1156288,1158505,1161052,1165241,1165710,957624 CVE References: CVE-2018-11354,CVE-2018-11355,CVE-2018-11356,CVE-2018-11357,CVE-2018-11358,CVE-2018-11359,CVE-2018-11360,CVE-2018-11361,CVE-2018-11362,CVE-2018-12086,CVE-2018-14339,CVE-2018-14340,CVE-2018-14341,CVE-2018-14342,CVE-2018-14343,CVE-2018-14344,CVE-2018-14367,CVE-2018-14368,CVE-2018-14369,CVE-2018-14370,CVE-2018-16056,CVE-2018-16057,CVE-2018-16058,CVE-2018-18225,CVE-2018-18226,CVE-2018-18227,CVE-2018-19622,CVE-2018-19623,CVE-2018-19624,CVE-2018-19625,CVE-2018-19626,CVE-2018-19627,CVE-2018-19628,CVE-2019-10894,CVE-2019-10895,CVE-2019-10896,CVE-2019-10897,CVE-2019-10898,CVE-2019-10899,CVE-2019-10900,CVE-2019-10901,CVE-2019-10902,CVE-2019-10903,CVE-2019-13619,CVE-2019-16319,CVE-2019-19553,CVE-2019-5716,CVE-2019-5717,CVE-2019-5718,CVE-2019-5719,CVE-2019-5721,CVE-2019-9208,CVE-2019-9209,CVE-2019-9214,CVE-2020-7044,CVE-2020-9428,CVE-2020-9429,CVE-2020-9430,CVE-2020-9431 Sources used: openSUSE Leap 15.1 (src): libmaxminddb-1.4.2-lp151.3.3.1, spandsp-0.0.6-lp151.3.3.1, wireshark-3.2.2-lp151.2.9.1 -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com