https://bugs.kde.org/show_bug.cgi?id=443155

            Bug ID: 443155
           Summary: kdeconnect breaks when openssl is upgraded to version
                    8.8p1-1
           Product: kdeconnect
           Version: unspecified
          Platform: Archlinux Packages
                OS: Linux
            Status: REPORTED
          Severity: major
          Priority: NOR
         Component: common
          Assignee: albertv...@gmail.com
          Reporter: mike.cloa...@gmail.com
  Target Milestone: ---

SUMMARY

kdeconnect on the plasma desktop, when paired to an android phone running
kdeconnect, and that previously opened/exposed the phone filesystem on the
linux plasma desktop, now fails to do so after the openssl package is updated
to version 8.8p1-1

STEPS TO REPRODUCE
1. transfer files from phone to computer using kdeconnect when paired correctly
2. update openssl to version 8.8p1-1
3. kdeconnect now fails to open the directory tree on the phone using sshfs
once the openssl package has been updated, since sshfs depends on openssl

OBSERVED RESULT
desktop kdeconnect now beeps repeatedly with a warning that sshfs cannot expose
the filesystem, and in the journal log lines now contain:

kdeconnectd[1007]: QDBusAbstractAdaptor: Cannot relay signal
SftpPlugin::packetReceived(NetworkPacket): Unregistered input type in parameter
list: NetworkPacket


EXPECTED RESULT
The phone filesystem should be exposed so that files can be transferred.

SOFTWARE/OS VERSIONS
Windows: 
macOS: 
Linux/KDE Plasma: 
(available in About System)
KDE Plasma Version: plasma-desktop 5.22.5-1
KDE Frameworks Version: plasma-framework 5.86.0-1
Qt Version: qt5-base 5.15.2+kde+r227-1

kdeconnect 21.08.1-1

ADDITIONAL INFORMATION

It is possible that the changelog at https://www.openssh.com/releasenotes.html
may have an impact on sshfs and kdeconnect - such as the "potentially
incompatible changes" that would affect other code which uses the new
incompatibilities including sshfs and kdeconnect

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to