Bug 1202053 - Nokogiri was built against LibXML version 2.9.12, but has dynamically loaded 2.9.14
Summary: Nokogiri was built against LibXML version 2.9.12, but has dynamically loaded ...
Status: CONFIRMED
: 1214337 (view as bug list)
Alias: None
Product: openSUSE Distribution
Classification: openSUSE
Component: Ruby (show other bugs)
Version: Leap 15.4
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Ruby Devel
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-08-02 10:49 UTC by Moritz Duge
Modified: 2024-07-08 11:00 UTC (History)
9 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Duge 2022-08-02 10:49:59 UTC
Since the libxml2-2-2.9.14 update ruby2.5-rubygem-nokogiri reports:

WARNING: Nokogiri was built against LibXML version 2.9.12, but has dynamically loaded 2.9.14

Reproduction:
ruby -e 'require "nokogiri"'

Please coordinate with bug 1201978.
Comment 1 Marcus Rückert 2022-08-02 11:40:22 UTC
This is not really a bug TBH.
Comment 2 Ulrich Windl 2022-08-08 06:20:23 UTC
I see it, too. When it's "not a bug", then the message is confusing at least.
Comment 3 Dominique Leuenberger 2022-12-07 14:04:28 UTC
(In reply to Marcus Rückert from comment #1)
> This is not really a bug TBH.

imho it is - nokogiri requires a rebuild (or if it does not care, shall shut up)
Comment 4 Don Price 2022-12-20 21:12:52 UTC
I am seeing a similar issue on all of our RMT servers in the public cloud infrastructure.  Our registration sharing service which is invoked every 30 seconds started showing the following warnings when we upgraded from SLES 15 SP3 to SLES 15 SP4:

bundle.ruby2.5[17998]: WARNING: Nokogiri was built against libxml version 2.9.7, but has dynamically loaded 2.9.14
bundle.ruby2.5[17998]: WARNING: Nokogiri was built against libxslt version 1.1.32, but has dynamically loaded 1.1.34

The task completes as expected, but the warnings are bloating our logs - I agree w/ Dominique's comment from Dec. 7th that this warrants a rebuild of Nokogiri.
Comment 5 Stefan Hundhammer 2022-12-21 10:24:11 UTC
It might be just a cosmetic problem, but it confuses a lot of users: They also see those messages on the text console during installation, and of course they think there is something seriously wrong.

At the very least, it's unprofessional to confront an end user with those messages.
Comment 6 Thomas Schmidt 2022-12-21 14:24:25 UTC
I think we cannot control which libxml patchlevel version is installed on the client, to make it match with what was there during build time. But we can skip that warning in RMT, patch will be in the next maintenance release (>2.10).
Comment 8 OBSbugzilla Bot 2023-04-25 10:35:02 UTC
This is an autogenerated message for OBS integration:
This bug (1202053) was mentioned in
https://build.opensuse.org/request/show/1082660 Factory / rmt-server
Comment 9 Fabian Vogt 2023-05-10 06:33:40 UTC
(In reply to Dominique Leuenberger from comment #3)
> (In reply to Marcus Rückert from comment #1)
> > This is not really a bug TBH.
> 
> imho it is - nokogiri requires a rebuild (or if it does not care, shall shut
> up)

Correct.

Either it does not need to be rebuilt and the warning needs to be removed, or the warning is correct and it needs an %requires_eq libxml2-2.
Comment 11 Maintenance Automation 2023-05-24 08:30:01 UTC
SUSE-SU-2023:2280-1: An update that solves two vulnerabilities and has six fixes can now be installed.

Category: security (important)
Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398
CVE References: CVE-2023-27530, CVE-2023-28120
Sources used:
Public Cloud Module 15-SP3 (src): rmt-server-2.13-150300.3.24.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): rmt-server-2.13-150300.3.24.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): rmt-server-2.13-150300.3.24.1
SUSE Linux Enterprise Real Time 15 SP3 (src): rmt-server-2.13-150300.3.24.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): rmt-server-2.13-150300.3.24.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): rmt-server-2.13-150300.3.24.1
SUSE Manager Proxy 4.2 (src): rmt-server-2.13-150300.3.24.1
SUSE Manager Retail Branch Server 4.2 (src): rmt-server-2.13-150300.3.24.1
SUSE Manager Server 4.2 (src): rmt-server-2.13-150300.3.24.1
SUSE Enterprise Storage 7.1 (src): rmt-server-2.13-150300.3.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-05-25 08:30:01 UTC
SUSE-SU-2023:2295-1: An update that solves two vulnerabilities and has six fixes can now be installed.

Category: security (important)
Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398
CVE References: CVE-2023-27530, CVE-2023-28120
Sources used:
openSUSE Leap 15.4 (src): rmt-server-2.13-150400.3.12.1
Public Cloud Module 15-SP4 (src): rmt-server-2.13-150400.3.12.1
Server Applications Module 15-SP4 (src): rmt-server-2.13-150400.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-05-25 08:30:04 UTC
SUSE-SU-2023:2294-1: An update that solves two vulnerabilities and has six fixes can now be installed.

Category: security (important)
Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398
CVE References: CVE-2023-27530, CVE-2023-28120
Sources used:
Public Cloud Module 15-SP2 (src): rmt-server-2.13-150200.3.32.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): rmt-server-2.13-150200.3.32.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): rmt-server-2.13-150200.3.32.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): rmt-server-2.13-150200.3.32.1
SUSE Enterprise Storage 7 (src): rmt-server-2.13-150200.3.32.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2023-05-25 16:30:01 UTC
SUSE-SU-2023:2304-1: An update that solves two vulnerabilities and has six fixes can now be installed.

Category: security (important)
Bug References: 1202053, 1203171, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398
CVE References: CVE-2023-27530, CVE-2023-28120
Sources used:
Public Cloud Module 15-SP1 (src): rmt-server-2.13-150100.3.45.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): rmt-server-2.13-150100.3.45.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): rmt-server-2.13-150100.3.45.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): rmt-server-2.13-150100.3.45.1
SUSE CaaS Platform 4.0 (src): rmt-server-2.13-150100.3.45.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Lukas Ocilka 2023-05-29 09:04:25 UTC
*** Bug 1211794 has been marked as a duplicate of this bug. ***
Comment 17 Maintenance Automation 2023-07-04 16:30:40 UTC
SUSE-SU-2023:2781-1: An update that solves three vulnerabilities and has eight fixes can now be installed.

Category: security (important)
Bug References: 1202053, 1203171, 1204285, 1204769, 1205089, 1206593, 1207670, 1209096, 1209507, 1209825, 1211398
CVE References: CVE-2022-31254, CVE-2023-27530, CVE-2023-28120
Sources used:
openSUSE Leap 15.5 (src): rmt-server-2.13-150500.3.3.1
Public Cloud Module 15-SP5 (src): rmt-server-2.13-150500.3.3.1
Server Applications Module 15-SP5 (src): rmt-server-2.13-150500.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 19 Marcus Rückert 2023-08-16 15:22:28 UTC
*** Bug 1214337 has been marked as a duplicate of this bug. ***
Comment 20 Till Dörges 2023-08-17 08:19:32 UTC
(In reply to Marcus Rückert from comment #19)

> *** Bug 1214337 has been marked as a duplicate of this bug. ***

Ack, then please also fix for openSUSE Leap 15.5, as the bug appeared there again.

FTR, currently everything is fine for Leap 15.4, i.e. no error message appears.
Comment 21 Marcus Rückert 2023-09-15 00:31:18 UTC
https://github.com/sparklemotion/nokogiri/issues/2978
Comment 22 Joaquín Rivera 2023-11-16 06:15:22 UTC
Message is still present for SLE 15 SP6, could you please apply to product as well, so we can remove the soft-failure?
https://openqa.suse.de/tests/12803577#step/add_users/34