Bugzilla – Bug 1202053
Nokogiri was built against LibXML version 2.9.12, but has dynamically loaded 2.9.14
Last modified: 2024-07-08 11:00:06 UTC
Since the libxml2-2-2.9.14 update ruby2.5-rubygem-nokogiri reports: WARNING: Nokogiri was built against LibXML version 2.9.12, but has dynamically loaded 2.9.14 Reproduction: ruby -e 'require "nokogiri"' Please coordinate with bug 1201978.
This is not really a bug TBH.
I see it, too. When it's "not a bug", then the message is confusing at least.
(In reply to Marcus Rückert from comment #1) > This is not really a bug TBH. imho it is - nokogiri requires a rebuild (or if it does not care, shall shut up)
I am seeing a similar issue on all of our RMT servers in the public cloud infrastructure. Our registration sharing service which is invoked every 30 seconds started showing the following warnings when we upgraded from SLES 15 SP3 to SLES 15 SP4: bundle.ruby2.5[17998]: WARNING: Nokogiri was built against libxml version 2.9.7, but has dynamically loaded 2.9.14 bundle.ruby2.5[17998]: WARNING: Nokogiri was built against libxslt version 1.1.32, but has dynamically loaded 1.1.34 The task completes as expected, but the warnings are bloating our logs - I agree w/ Dominique's comment from Dec. 7th that this warrants a rebuild of Nokogiri.
It might be just a cosmetic problem, but it confuses a lot of users: They also see those messages on the text console during installation, and of course they think there is something seriously wrong. At the very least, it's unprofessional to confront an end user with those messages.
I think we cannot control which libxml patchlevel version is installed on the client, to make it match with what was there during build time. But we can skip that warning in RMT, patch will be in the next maintenance release (>2.10).
This is an autogenerated message for OBS integration: This bug (1202053) was mentioned in https://build.opensuse.org/request/show/1082660 Factory / rmt-server
(In reply to Dominique Leuenberger from comment #3) > (In reply to Marcus Rückert from comment #1) > > This is not really a bug TBH. > > imho it is - nokogiri requires a rebuild (or if it does not care, shall shut > up) Correct. Either it does not need to be rebuilt and the warning needs to be removed, or the warning is correct and it needs an %requires_eq libxml2-2.
SUSE-SU-2023:2280-1: An update that solves two vulnerabilities and has six fixes can now be installed. Category: security (important) Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398 CVE References: CVE-2023-27530, CVE-2023-28120 Sources used: Public Cloud Module 15-SP3 (src): rmt-server-2.13-150300.3.24.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): rmt-server-2.13-150300.3.24.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): rmt-server-2.13-150300.3.24.1 SUSE Linux Enterprise Real Time 15 SP3 (src): rmt-server-2.13-150300.3.24.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): rmt-server-2.13-150300.3.24.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): rmt-server-2.13-150300.3.24.1 SUSE Manager Proxy 4.2 (src): rmt-server-2.13-150300.3.24.1 SUSE Manager Retail Branch Server 4.2 (src): rmt-server-2.13-150300.3.24.1 SUSE Manager Server 4.2 (src): rmt-server-2.13-150300.3.24.1 SUSE Enterprise Storage 7.1 (src): rmt-server-2.13-150300.3.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2295-1: An update that solves two vulnerabilities and has six fixes can now be installed. Category: security (important) Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398 CVE References: CVE-2023-27530, CVE-2023-28120 Sources used: openSUSE Leap 15.4 (src): rmt-server-2.13-150400.3.12.1 Public Cloud Module 15-SP4 (src): rmt-server-2.13-150400.3.12.1 Server Applications Module 15-SP4 (src): rmt-server-2.13-150400.3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2294-1: An update that solves two vulnerabilities and has six fixes can now be installed. Category: security (important) Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398 CVE References: CVE-2023-27530, CVE-2023-28120 Sources used: Public Cloud Module 15-SP2 (src): rmt-server-2.13-150200.3.32.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): rmt-server-2.13-150200.3.32.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): rmt-server-2.13-150200.3.32.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): rmt-server-2.13-150200.3.32.1 SUSE Enterprise Storage 7 (src): rmt-server-2.13-150200.3.32.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2304-1: An update that solves two vulnerabilities and has six fixes can now be installed. Category: security (important) Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398 CVE References: CVE-2023-27530, CVE-2023-28120 Sources used: Public Cloud Module 15-SP1 (src): rmt-server-2.13-150100.3.45.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): rmt-server-2.13-150100.3.45.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): rmt-server-2.13-150100.3.45.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): rmt-server-2.13-150100.3.45.1 SUSE CaaS Platform 4.0 (src): rmt-server-2.13-150100.3.45.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
*** Bug 1211794 has been marked as a duplicate of this bug. ***
SUSE-SU-2023:2781-1: An update that solves three vulnerabilities and has eight fixes can now be installed. Category: security (important) Bug References: 1202053, 1203171, 1204285, 1204769, 1205089, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398 CVE References: CVE-2022-31254, CVE-2023-27530, CVE-2023-28120 Sources used: openSUSE Leap 15.5 (src): rmt-server-2.13-150500.3.3.1 Public Cloud Module 15-SP5 (src): rmt-server-2.13-150500.3.3.1 Server Applications Module 15-SP5 (src): rmt-server-2.13-150500.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
*** Bug 1214337 has been marked as a duplicate of this bug. ***
(In reply to Marcus Rückert from comment #19) > *** Bug 1214337 has been marked as a duplicate of this bug. *** Ack, then please also fix for openSUSE Leap 15.5, as the bug appeared there again. FTR, currently everything is fine for Leap 15.4, i.e. no error message appears.
https://github.com/sparklemotion/nokogiri/issues/2978
Message is still present for SLE 15 SP6, could you please apply to product as well, so we can remove the soft-failure? https://openqa.suse.de/tests/12803577#step/add_users/34