http://bugzilla.suse.com/show_bug.cgi?id=1069731
Chenzi Cao <chcao(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Assignee|bnc-team-screening(a)forge.pr |sbrabec(a)suse.com
|ovo.novell.com |
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1070013http://bugzilla.suse.com/show_bug.cgi?id=1070013#c3
Neil Brown <nfbrown(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
CC| |yast2-maintainers(a)suse.de
Resolution|INVALID |---
Flags| |needinfo?(yast2-maintainers
| |(a)suse.de)
--- Comment #3 from Neil Brown <nfbrown(a)suse.com> ---
(In reply to Archie Cobbs from comment #2)
> In other words, if I say:
>
> NFS3_SERVER_SUPPORT="no"
>
> then rpc.bind and rpc.statd should automatically be masked (or otherwise
> prevented from starting) without any additional work.
That can only be done by changes to yast, so they if you use the yast front end
to set NFS3_SERVER_SUPPORT to "no", and if it can deduce that nothing else
needs rpcbind, then it can run "systemctl mask rpcbind" for you.
Let's ask they yast developers what they think.
>
> Put another way, the bug is that the setting NFS3_SERVER_SUPPORT="no" is not
> fully implemented.
>
> By the way, there should also be a similar setting controlling the
> enablement of rpc.gssd and rpc-svcgssd, e.g.:
>
> NFS4_GSS_SUPPORT="no"
IF you don't want rpc.gssd, is it sufficient to not have /etc/krb5.keytab.
If you want to have the keytab, but not the server (why?) you can explicitly
mask rpc-gssd.service.
Again, if you want this to happy automatically, yast has to do it for you.
It is not possible for you to simply change the sysconfig file and systemd
deduce that you don't want certain programs to run.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1070683
Bug ID: 1070683
Summary: Request for signing megaraid_sas driver
version-07.704.04.00 using sles 12 solid driver
program
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 42.3
Hardware: 64bit
OS: openSUSE 12.1
Status: NEW
Severity: Major
Priority: P5 - None
Component: Kernel
Assignee: kernel-maintainers(a)forge.provo.novell.com
Reporter: nischal.martis(a)broadcom.com
QA Contact: qa-bugs(a)suse.de
CC: lauri.cerneck(a)avagotech.com,
nischal.martis(a)broadcom.com,
nitin.kishore(a)broadcom.com, poswald(a)suse.com,
sumit.saxena(a)lsi.com, tiwai(a)suse.com
Depends on: 1070517
Found By: ---
Blocker: ---
Driver signing for megaraid_sas 07.704.04.00 on SLES 12.x
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1070478
Bug ID: 1070478
Summary: Virtualization with virt-manager shareable disks are
imposible
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: x86-64
OS: openSUSE Factory
Status: NEW
Severity: Major
Priority: P5 - None
Component: KVM
Assignee: kvm-bugs(a)forge.provo.novell.com
Reporter: dev.dorrejo(a)gmail.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:57.0) Gecko/20100101
Firefox/57.0
Build Identifier:
Hello i am trying to create a RAC lab, with KVM/QEMU using libvirt and when i
add the disk to both VMs and put the option shareable the app send the next
alert when i run both VMs:
rror starting domain: internal error: process exited while connecting to
monitor: 2017-11-30T05:23:44.088281Z qemu-system-x86_64: -chardev
pty,id=charserial0: char device redirected to /dev/pts/3 (label charserial0)
2017-11-30T05:23:44.160652Z qemu-system-x86_64: -device
scsi-hd,bus=scsi0.0,channel=0,scsi-id=0,lun=0,drive=drive-scsi0-0-0-0,id=scsi0-0-0-0:
Failed to get "write" lock
Is another process using the image?
Traceback (most recent call last):
File "/usr/share/virt-manager/virtManager/asyncjob.py", line 89, in
cb_wrapper
callback(asyncjob, *args, **kwargs)
File "/usr/share/virt-manager/virtManager/asyncjob.py", line 125, in tmpcb
callback(*args, **kwargs)
File "/usr/share/virt-manager/virtManager/libvirtobject.py", line 82, in
newfn
ret = fn(self, *args, **kwargs)
File "/usr/share/virt-manager/virtManager/domain.py", line 1505, in startup
self._backend.create()
File "/usr/lib64/python2.7/site-packages/libvirt.py", line 1069, in create
if ret == -1: raise libvirtError ('virDomainCreate() failed', dom=self)
libvirtError: internal error: process exited while connecting to monitor:
2017-11-30T05:23:44.088281Z qemu-system-x86_64: -chardev pty,id=charserial0:
char device redirected to /dev/pts/3 (label charserial0)
2017-11-30T05:23:44.160652Z qemu-system-x86_64: -device
scsi-hd,bus=scsi0.0,channel=0,scsi-id=0,lun=0,drive=drive-scsi0-0-0-0,id=scsi0-0-0-0:
Failed to get "write" lock
Is another process using the image?
I try with SCSI and VirtIO but only appear that alert when i try run, first
turn on one, and when i try turn on the other one that message appear.
Reproducible: Always
Steps to Reproduce:
1.Create 2 VMs
2.Create a Raw image
3.add new disk on both VMs using the Raw image and putting the flag shareable.
Actual Results:
appear the next alert:
Error starting domain: internal error: process exited while connecting to
monitor: 2017-11-30T05:23:44.088281Z qemu-system-x86_64: -chardev
pty,id=charserial0: char device redirected to /dev/pts/3 (label charserial0)
2017-11-30T05:23:44.160652Z qemu-system-x86_64: -device
scsi-hd,bus=scsi0.0,channel=0,scsi-id=0,lun=0,drive=drive-scsi0-0-0-0,id=scsi0-0-0-0:
Failed to get "write" lock
Is another process using the image?
Traceback (most recent call last):
File "/usr/share/virt-manager/virtManager/asyncjob.py", line 89, in
cb_wrapper
callback(asyncjob, *args, **kwargs)
File "/usr/share/virt-manager/virtManager/asyncjob.py", line 125, in tmpcb
callback(*args, **kwargs)
File "/usr/share/virt-manager/virtManager/libvirtobject.py", line 82, in
newfn
ret = fn(self, *args, **kwargs)
File "/usr/share/virt-manager/virtManager/domain.py", line 1505, in startup
self._backend.create()
File "/usr/lib64/python2.7/site-packages/libvirt.py", line 1069, in create
if ret == -1: raise libvirtError ('virDomainCreate() failed', dom=self)
libvirtError: internal error: process exited while connecting to monitor:
2017-11-30T05:23:44.088281Z qemu-system-x86_64: -chardev pty,id=charserial0:
char device redirected to /dev/pts/3 (label charserial0)
2017-11-30T05:23:44.160652Z qemu-system-x86_64: -device
scsi-hd,bus=scsi0.0,channel=0,scsi-id=0,lun=0,drive=drive-scsi0-0-0-0,id=scsi0-0-0-0:
Failed to get "write" lock
Is another process using the image?
Expected Results:
Both machine boot up and can see the disks IO on live.
Opensuse TW last snapshot 20171125 last kernel 4.14.1.1.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=970239http://bugzilla.suse.com/show_bug.cgi?id=970239#c49
--- Comment #49 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2017:3170-1: An update that solves 57 vulnerabilities and has 18 fixes
is now available.
Category: security (moderate)
Bug References:
1003846,1025282,1029907,1029908,1029909,1029995,1030296,1030297,1030298,1030583,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1033122,1037052,1037057,1037061,1037062,1037066,1037070,1037072,1037273,1038874,1038875,1038876,1038877,1038878,1038880,1038881,1044891,1044897,1044901,1044909,1044925,1044927,1046094,1052061,1052496,1052503,1052507,1052509,1052511,1052514,1052518,1053347,1056312,1056437,1057139,1057144,1057149,1058480,1059050,1060599,1060621,1061241,437293,445037,546106,561142,578249,590820,691290,698346,713504,776968,863764,938658,970239
CVE References:
CVE-2014-9939,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7227,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-7614,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8395,CVE-2017-8396,CVE-2017-8397,CVE-2017-8398,CVE-2017-8421,CVE-2017-9038,CVE-2017-9039,CVE-2017-9040,CVE-2017-9041,CVE-2017-9042,CVE-2017-9043,CVE-2017-9044,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2017-9954,CVE-2017-9955
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for SAP 12-SP1 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):
binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP2 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP2 (src): binutils-2.29.1-9.20.2
OpenStack Cloud Magnum Orchestration 7 (src): binutils-2.29.1-9.20.2
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=938658http://bugzilla.suse.com/show_bug.cgi?id=938658#c6
--- Comment #6 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2017:3170-1: An update that solves 57 vulnerabilities and has 18 fixes
is now available.
Category: security (moderate)
Bug References:
1003846,1025282,1029907,1029908,1029909,1029995,1030296,1030297,1030298,1030583,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1033122,1037052,1037057,1037061,1037062,1037066,1037070,1037072,1037273,1038874,1038875,1038876,1038877,1038878,1038880,1038881,1044891,1044897,1044901,1044909,1044925,1044927,1046094,1052061,1052496,1052503,1052507,1052509,1052511,1052514,1052518,1053347,1056312,1056437,1057139,1057144,1057149,1058480,1059050,1060599,1060621,1061241,437293,445037,546106,561142,578249,590820,691290,698346,713504,776968,863764,938658,970239
CVE References:
CVE-2014-9939,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7227,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-7614,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8395,CVE-2017-8396,CVE-2017-8397,CVE-2017-8398,CVE-2017-8421,CVE-2017-9038,CVE-2017-9039,CVE-2017-9040,CVE-2017-9041,CVE-2017-9042,CVE-2017-9043,CVE-2017-9044,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2017-9954,CVE-2017-9955
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for SAP 12-SP1 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):
binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP2 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP2 (src): binutils-2.29.1-9.20.2
OpenStack Cloud Magnum Orchestration 7 (src): binutils-2.29.1-9.20.2
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=691290http://bugzilla.suse.com/show_bug.cgi?id=691290#c6
--- Comment #6 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2017:3170-1: An update that solves 57 vulnerabilities and has 18 fixes
is now available.
Category: security (moderate)
Bug References:
1003846,1025282,1029907,1029908,1029909,1029995,1030296,1030297,1030298,1030583,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1033122,1037052,1037057,1037061,1037062,1037066,1037070,1037072,1037273,1038874,1038875,1038876,1038877,1038878,1038880,1038881,1044891,1044897,1044901,1044909,1044925,1044927,1046094,1052061,1052496,1052503,1052507,1052509,1052511,1052514,1052518,1053347,1056312,1056437,1057139,1057144,1057149,1058480,1059050,1060599,1060621,1061241,437293,445037,546106,561142,578249,590820,691290,698346,713504,776968,863764,938658,970239
CVE References:
CVE-2014-9939,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7227,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-7614,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8395,CVE-2017-8396,CVE-2017-8397,CVE-2017-8398,CVE-2017-8421,CVE-2017-9038,CVE-2017-9039,CVE-2017-9040,CVE-2017-9041,CVE-2017-9042,CVE-2017-9043,CVE-2017-9044,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2017-9954,CVE-2017-9955
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for SAP 12-SP1 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):
binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP2 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP2 (src): binutils-2.29.1-9.20.2
OpenStack Cloud Magnum Orchestration 7 (src): binutils-2.29.1-9.20.2
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=590820http://bugzilla.suse.com/show_bug.cgi?id=590820#c4
--- Comment #4 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2017:3170-1: An update that solves 57 vulnerabilities and has 18 fixes
is now available.
Category: security (moderate)
Bug References:
1003846,1025282,1029907,1029908,1029909,1029995,1030296,1030297,1030298,1030583,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1033122,1037052,1037057,1037061,1037062,1037066,1037070,1037072,1037273,1038874,1038875,1038876,1038877,1038878,1038880,1038881,1044891,1044897,1044901,1044909,1044925,1044927,1046094,1052061,1052496,1052503,1052507,1052509,1052511,1052514,1052518,1053347,1056312,1056437,1057139,1057144,1057149,1058480,1059050,1060599,1060621,1061241,437293,445037,546106,561142,578249,590820,691290,698346,713504,776968,863764,938658,970239
CVE References:
CVE-2014-9939,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7227,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-7614,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8395,CVE-2017-8396,CVE-2017-8397,CVE-2017-8398,CVE-2017-8421,CVE-2017-9038,CVE-2017-9039,CVE-2017-9040,CVE-2017-9041,CVE-2017-9042,CVE-2017-9043,CVE-2017-9044,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2017-9954,CVE-2017-9955
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for SAP 12-SP1 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):
binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP2 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP2 (src): binutils-2.29.1-9.20.2
OpenStack Cloud Magnum Orchestration 7 (src): binutils-2.29.1-9.20.2
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1029995http://bugzilla.suse.com/show_bug.cgi?id=1029995#c6
Mark Post <mpost(a)suse.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #6 from Mark Post <mpost(a)suse.com> ---
Marking as closed.
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1029995http://bugzilla.suse.com/show_bug.cgi?id=1029995#c5
--- Comment #5 from Swamp Workflow Management <swamp(a)suse.de> ---
SUSE-SU-2017:3170-1: An update that solves 57 vulnerabilities and has 18 fixes
is now available.
Category: security (moderate)
Bug References:
1003846,1025282,1029907,1029908,1029909,1029995,1030296,1030297,1030298,1030583,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1033122,1037052,1037057,1037061,1037062,1037066,1037070,1037072,1037273,1038874,1038875,1038876,1038877,1038878,1038880,1038881,1044891,1044897,1044901,1044909,1044925,1044927,1046094,1052061,1052496,1052503,1052507,1052509,1052511,1052514,1052518,1053347,1056312,1056437,1057139,1057144,1057149,1058480,1059050,1060599,1060621,1061241,437293,445037,546106,561142,578249,590820,691290,698346,713504,776968,863764,938658,970239
CVE References:
CVE-2014-9939,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7227,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-7614,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8395,CVE-2017-8396,CVE-2017-8397,CVE-2017-8398,CVE-2017-8421,CVE-2017-9038,CVE-2017-9039,CVE-2017-9040,CVE-2017-9041,CVE-2017-9042,CVE-2017-9043,CVE-2017-9044,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2017-9954,CVE-2017-9955
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):
binutils-2.29.1-9.20.2, cross-ppc-binutils-2.29.1-9.20.2,
cross-spu-binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for SAP 12-SP1 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):
binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Server 12-SP2 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP3 (src): binutils-2.29.1-9.20.2
SUSE Linux Enterprise Desktop 12-SP2 (src): binutils-2.29.1-9.20.2
OpenStack Cloud Magnum Orchestration 7 (src): binutils-2.29.1-9.20.2
--
You are receiving this mail because:
You are on the CC list for the bug.