http://bugzilla.suse.com/show_bug.cgi?id=980313
Bug ID: 980313 Summary: /usr/lib/zypp/plugins/commit/susemanager should be moved to susemanager related package and not be part of base salt-minion Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.1 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Other Assignee: bnc-team-screening@forge.provo.novell.com Reporter: mrueckert@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: ---
seen with salt-minion-2015.8.8-68.1.x86_64 from systemsmanagement:saltstack
the salt setup on the machine was turned off atm and this noticably slows down all zypp operations. if this plugin is mostly for susemanager it shouldnt be part of the normal salt-minion package. if it is meant to be used with normal salt, i would recommend renaming it.
http://bugzilla.suse.com/show_bug.cgi?id=980313
Bo Maryniuk bmaryniuk@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |bmaryniuk@suse.com Resolution|--- |FIXED
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c2
Andrej Semen asemen@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |asemen@suse.com, | |mrueckert@suse.com Flags| |needinfo?(mrueckert@suse.co | |m)
--- Comment #2 from Andrej Semen asemen@suse.com ---
after update candidate we have file part of salt-minion package rpm -qf /usr/lib/zypp/plugins/commit/susemanager salt-minion-2015.8.7-11.1.x86_64
before update is was: # rpm -q salt-minion salt-minion-2015.8.7-8.2.x86_64 # rpm -qf /usr/lib/zypp/plugins/commit/susemanager error: file /usr/lib/zypp/plugins/commit/susemanager: No such file or directory
is this the wanted?
http://bugzilla.suse.com/show_bug.cgi?id=980313
Marcus Rückert mrueckert@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(mrueckert@suse.co |needinfo?(bmaryniuk@suse.co |m) |m)
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c7
--- Comment #7 from Bernhard Wiedemann bwiedemann@suse.com --- This is an autogenerated message for OBS integration: This bug (980313) was mentioned in https://build.opensuse.org/request/show/430548 Factory / salt https://build.opensuse.org/request/show/430549 42.2 / salt
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c8
Duncan Mac-Vicar dmacvicar@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |dmacvicar@suse.com
--- Comment #8 from Duncan Mac-Vicar dmacvicar@suse.com --- The plugin is harmless on openSUSE, the only thing it does is to emit an event in the bus if the rpm db changes (so that the server side can request a new list).
Having it as part of the minion avoids have to "manage" whether the plugin is installed.
I hope nobody removed it.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c9
--- Comment #9 from Marcus Rückert mrueckert@suse.com --- it was moved to a subpackage.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c10
Duncan Mac-Vicar dmacvicar@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(mrueckert@suse.co | |m)
--- Comment #10 from Duncan Mac-Vicar dmacvicar@suse.com --- Where was this discussed? This violates the requirement that only salt is needed on the SUSE Manager side. This _breaks_ SUSE Manager.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c11
--- Comment #11 from Duncan Mac-Vicar dmacvicar@suse.com --- Commented on https://build.opensuse.org/request/show/430686
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c12
Bo Maryniuk bmaryniuk@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |kkaempf@suse.com Flags|needinfo?(bmaryniuk@suse.co |needinfo?(kkaempf@suse.com) |m) |
--- Comment #12 from Bo Maryniuk bmaryniuk@suse.com --- Marcus, sorry but this was not discussed that way. Since this plugin is no longer blocking zypper without SUMA components installed for a pretty long time, such split is not even needed. However, this split breaks released SUMA.
This SR should be reverted: https://build.opensuse.org/request/show/430686
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c13
Bo Maryniuk bmaryniuk@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED |---
--- Comment #13 from Bo Maryniuk bmaryniuk@suse.com --- Reopening until package SR (430686) is reverted back.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c14
Klaus Kämpf kkaempf@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution|--- |FIXED Flags|needinfo?(mrueckert@suse.co | |m), | |needinfo?(kkaempf@suse.com) |
--- Comment #14 from Klaus Kämpf kkaempf@suse.com --- (In reply to Bo Maryniuk from comment #12)
This SR should be reverted: https://build.opensuse.org/request/show/430686
This SR is for 2016.3 and thus not breaking (released) SUSE Manager.
Splitting SUSE Manager specifics off of salt is the "right thing to do" going forward. Putting it into Salt was a shortcut we took when releasing SUSE Manager 3.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c15
--- Comment #15 from Duncan Mac-Vicar dmacvicar@suse.com --- We took as a design principle that SUSE Manager would not require anything else than the salt package to operate as a client. With this change, you are deviating from that unless you make sure you can configure this plugin from the server side state, and that you make sure the plugin functionality does not create a chicken egg problem at bootstrap time.
Second, the zypp hook is not SUSE Manager specific. It is just a helper for anyone that want to see that rpmdb changed per transaction instead of per package install. The name is probably bad chosen. It can be used for anyone that want to audit this basic action in Salt.
I am fine, if you know the consequences and are prepared for all the adaptions.
http://bugzilla.suse.com/show_bug.cgi?id=980313
Bo Maryniuk bmaryniuk@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED |---
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c17
--- Comment #17 from Duncan Mac-Vicar dmacvicar@suse.com --- I don't think the intention per-se is wrong. You guys just need to evaluate the consequences. I think the RHEL version uses even a different approach for deployment. Just make sure everything is consistent and does not have side effects*.
As side effects I mean: If we deploy plugins with salt, we can ensure that they are there, but we can't easily remove them afterwards.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c18
--- Comment #18 from Klaus Kämpf kkaempf@suse.com --- A /usr/lib/zypp/plugins/commit/*susemanager* plugin must not be part of Salt. In this respect, I agree with the original reporter.
However, a generic /usr/lib/zypp/plugins/commit/*salt_notifier*, together with a respective 'yum' notifier (for Fedora/RHEL, 'apt' will follow later) might be part of Salt or a separate package. IMHO, we should keep the 'salt' package as clean and as close to upstream as possible.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c19
--- Comment #19 from Bo Maryniuk bmaryniuk@suse.com --- (In reply to Klaus Kämpf from comment #18)
A /usr/lib/zypp/plugins/commit/*susemanager* plugin must not be part of Salt. In this respect, I agree with the original reporter.
However, a generic /usr/lib/zypp/plugins/commit/*salt_notifier*, together with a respective 'yum' notifier (for Fedora/RHEL, 'apt' will follow later) might be part of Salt
You say "must not be part of Salt", then you say "might be part of Salt", which already is anyway. My point is, this is not something one just takes and changes on his own alone, but must be *team* discussion prior that and clear knowledge, reflecting in the RFC we *agreed*: https://github.com/SUSE/susemanager-rfc/blob/master/text/00003-salt-package-... — please note, this section is about Zypper + Salt.
The name is probably an issue, but I find it a low priority, because the content of the plugin won't change. Additionally, this part nor affects overall package functionality neither is directly user-land tooling whether generic users must use "susemanager" script directly, hence this makes the task even lower priority.
However, abruptly splitting without looking through the consequences and verification by support team is what I find certainly wrong.
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c20
--- Comment #20 from Klaus Kämpf kkaempf@suse.com --- (In reply to Bo Maryniuk from comment #19)
You say "must not be part of Salt", then you say "might be part of Salt", which already is anyway.
Bo, please read carefully. A *susemanager* plugins must not be part of Salt, a *salt_notifier* might.
My point is, this is not something one just takes and changes on his own alone, but must be *team* discussion prior that and clear knowledge, reflecting in the RFC we *agreed*:
I totally agree when it comes to upgrading Salt **in SUSE Manager** (that is systemsmanagement:saltstack:products) to 2016.3
However, systemsmanagement:saltstack is for openSUSE. Nobody took care of this project. 2016.3 is already ~6 months old and wasn't submitted to :saltstack yet.
Since darix and tampakrap took the initiative to push the upgrade (and agreed to do the testing and fixing if needed) to openSUSE, they have my full support.
http://bugzilla.suse.com/show_bug.cgi?id=980313
Bo Maryniuk bmaryniuk@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution|--- |FIXED
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c23
--- Comment #23 from Swamp Workflow Management swamp@suse.de --- SUSE-RU-2018:3021-1: An update that solves 5 vulnerabilities and has 125 fixes is now available.
Category: recommended (moderate) Bug References: 1002529,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1017078,1019386,1020831,1022562,1022841,1023535,1025896,1027044,1027240,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1071322,1072599,1075950,1079048,1081592,1087055,1087278,1087581,1087891,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099945,1100142,1100225,1100697,1101812,1101880,1102013,1102218,1102265,1103530,1103699,1104154,1106164,1108969,849184,849204,849205,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306,975733,975757,976148,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,988506,989193,989798,990029,990439,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696 Sources used: SUSE CaaS Platform 3.0 (src): salt-2018.3.0-2.3.2, sles12-salt-api-image-3.1.0-3.3.2, sles12-salt-master-image-3.1.0-4.3.2, sles12-salt-minion-image-3.1.0-3.3.2
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c26
--- Comment #26 from Swamp Workflow Management swamp@suse.de --- SUSE-OU-2019:13965-1: An update that solves 7 vulnerabilities and has 144 fixes is now available.
Category: optional (low) Bug References: 1002529,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1017078,1019386,1020831,1022562,1022841,1023535,1025896,1027044,1027240,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1071322,1072599,1075950,1079048,1081592,1087055,1087278,1087581,1087891,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099887,1099945,1100142,1100225,1100697,1101812,1101880,1102013,1102218,1102265,1103530,1104154,1104491,1106164,1107333,1108557,1108834,1108969,1108995,1109893,1110938,1112874,1113698,1113699,1113784,1114029,1114197,1114474,1114824,1116837,1117995,1121091,1123044,1123512,1123865,849184,849204,849205,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306 ,975733,975757,976148,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,988506,989193,989798,990029,990439,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696,CVE-2018-15750,CVE-2018-15751 Sources used:
http://bugzilla.suse.com/show_bug.cgi?id=980313 http://bugzilla.suse.com/show_bug.cgi?id=980313#c27
--- Comment #27 from Swamp Workflow Management swamp@suse.de --- SUSE-OU-2019:13964-1: An update that solves 7 vulnerabilities and has 144 fixes is now available.
Category: optional (low) Bug References: 1002529,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1017078,1019386,1020831,1022562,1022841,1023535,1025896,1027044,1027240,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1071322,1072599,1075950,1079048,1081592,1087055,1087278,1087581,1087891,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099887,1099945,1100142,1100225,1100697,1101812,1101880,1102013,1102218,1102265,1103530,1104154,1104491,1106164,1107333,1108557,1108834,1108969,1108995,1109893,1110938,1112874,1113698,1113699,1113784,1114029,1114197,1114474,1114824,1116837,1117995,1121091,1123044,1123512,1123865,849184,849204,849205,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306 ,975733,975757,976148,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,988506,989193,989798,990029,990439,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696,CVE-2018-15750,CVE-2018-15751 Sources used:
https://bugzilla.suse.com/show_bug.cgi?id=980313 https://bugzilla.suse.com/show_bug.cgi?id=980313#c30
--- Comment #30 from Swamp Workflow Management swamp@suse.de --- SUSE-SU-2020:14402-1: An update that solves 11 vulnerabilities and has 245 fixes is now available.
Category: security (moderate) Bug References: 1002529,1003449,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1013876,1013938,1015882,1017078,1019386,1020831,1022562,1022841,1023535,1024406,1025896,1027044,1027240,1027426,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1044719,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1070372,1071322,1072599,1075950,1076578,1079048,1080290,1081151,1081592,1083294,1085667,1087055,1087278,1087581,1087891,1088070,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1094190,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099887,1099945,1100142,1100225,1100697,1101780,1101812,1101880,1102013,1102218,1102265,1102819,1103090,1103530,1103696,1104034,1104154,1104491,1106164,1107333,1108557,1108834,1108969,1108995,1109023,1109893,1110938,1111542,1112874,1113698,1113699,1113784,1114029,1114197,111447 4,1114824,1116343,1116837,1117995,1121091,1121439,1122663,1122680,1123044,1123512,1123865,1124277,1125015,1125610,1125744,1127389,1128061,1128554,1129079,1129243,1130077,1130588,1130784,1131114,1132076,1133523,1133647,1134860,1135360,1135507,1135567,1135732,1135881,1137642,1138454,1139761,1140193,1140912,1143301,1146192,1146382,1148311,1148714,1150447,1151650,1151947,1152366,1153090,1153277,1153611,1154620,1154940,1155372,1157465,1157479,1158441,1159284,1162327,1162504,1163871,1163981,1165425,1165572,1167437,1167556,1168340,1169604,1169800,1170104,1170288,1170595,1171687,1171906,1172075,1173072,769106,769108,776615,849184,849204,849205,879904,887879,889605,892707,902494,908849,926318,932288,945380,948245,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306,975733,975757,976148,977264,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,987798,988506,989193,989798,990029,990439,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696,CVE-2018-15750,CVE-2018-15751,CVE-2019-17361,CVE-2019-18897,CVE-2020-11651,CVE-2020-11652 Sources used:
NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
https://bugzilla.suse.com/show_bug.cgi?id=980313 https://bugzilla.suse.com/show_bug.cgi?id=980313#c32
--- Comment #32 from Swamp Workflow Management swamp@suse.de --- SUSE-SU-2020:14431-1: An update that solves 11 vulnerabilities and has 251 fixes is now available.
Category: security (moderate) Bug References: 1002529,1003449,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1013876,1013938,1015882,1017078,1019386,1020831,1022562,1022841,1023535,1024406,1025896,1027044,1027240,1027426,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1044719,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1070372,1071322,1072599,1075950,1076578,1079048,1080290,1081151,1081592,1083294,1085667,1087055,1087278,1087581,1087891,1088070,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1094190,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099887,1099945,1100142,1100225,1100697,1101780,1101812,1101880,1102013,1102218,1102265,1102819,1103090,1103530,1103696,1104034,1104154,1104491,1106164,1107333,1108557,1108834,1108969,1108995,1109023,1109893,1110938,1111542,1112874,1113698,1113699,1113784,1114029,1114197,111447 4,1114824,1116343,1116837,1117995,1121091,1121439,1122663,1122680,1123044,1123512,1123865,1124277,1125015,1125610,1125744,1127389,1128061,1128554,1129079,1129243,1130077,1130588,1130784,1131114,1132076,1133523,1133647,1134860,1135360,1135507,1135567,1135656,1135732,1135881,1137642,1138454,1138952,1139761,1140193,1140912,1143301,1146192,1146382,1148311,1148714,1150447,1151650,1151947,1152366,1153090,1153277,1153611,1154620,1154940,1155372,1157465,1157479,1158441,1158940,1159118,1159284,1160931,1162327,1162504,1163871,1165425,1165572,1167437,1167556,1168340,1169604,1169800,1170042,1170104,1170288,1170595,1171687,1171906,1172075,1173072,1174165,769106,769108,776615,849184,849204,849205,879904,887879,889605,892707,902494,908849,926318,932288,945380,948245,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306,975733,975757,976148,977264,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,987798,988506,989193,989798,990029,9904 39,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696,CVE-2018-15750,CVE-2018-15751,CVE-2019-17361,CVE-2019-18897,CVE-2020-11651,CVE-2020-11652 Sources used:
NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
https://bugzilla.suse.com/show_bug.cgi?id=980313 https://bugzilla.suse.com/show_bug.cgi?id=980313#c38
--- Comment #38 from Swamp Workflow Management swamp@suse.de --- SUSE-SU-2021:0315-1: An update that solves 14 vulnerabilities and has 218 fixes is now available.
Category: security (moderate) Bug References: 1002529,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1017078,1019386,1020831,1022562,1022841,1023535,1025896,1027044,1027240,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1071322,1072599,1075950,1079048,1081592,1083110,1087055,1087278,1087581,1087891,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099887,1099945,1100142,1100225,1100697,1101780,1101812,1101880,1102013,1102218,1102248,1102265,1102819,1103530,1104154,1104491,1106164,1107333,1108557,1108834,1108969,1108995,1109893,1110938,1112874,1113698,1113699,1113784,1114029,1114197,1114474,1114824,1116343,1116837,1117995,1121091,1121439,1122663,1122680,1123044,1123512,1123865,1124277,1125015,1128061,1128554,1129079,1130588,113078 4,1131114,1132076,1133523,1133647,1134860,1135360,1135507,1135567,1135656,1135732,1137642,1138952,1139761,1140193,1140912,1143301,1146192,1146382,1148714,1150447,1151650,1151947,1152366,1153611,1154620,1157465,1157479,1158441,1158940,1159118,1159284,1159670,1160931,1162327,1162504,1165425,1165572,1167437,1167556,1168340,1169604,1169800,1170042,1170104,1170288,1170595,1171461,1171906,1172075,1172211,1173072,1173909,1173911,1173936,1174165,1175549,1175987,1176024,1176294,1176397,1176480,1177867,1178319,1178361,1178362,1178485,849184,849204,849205,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306,975733,975757,976148,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,988506,989193,989798,990029,990439,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696,CVE-2018-15750,CVE-2018-15751,CVE-2019-17361,CVE-2019-18897,CVE-2020-11651,CVE-2020-11652,CVE-2020-16846,CVE-2020-17490,CVE-2020-25592 JIRA References: Sources used:
NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
https://bugzilla.suse.com/show_bug.cgi?id=980313 https://bugzilla.suse.com/show_bug.cgi?id=980313#c39
--- Comment #39 from Swamp Workflow Management swamp@suse.de --- SUSE-SU-2021:0316-1: An update that solves 14 vulnerabilities and has 218 fixes is now available.
Category: security (moderate) Bug References: 1002529,1004047,1004260,1004723,1008933,1011304,1011800,1012398,1012999,1017078,1019386,1020831,1022562,1022841,1023535,1025896,1027044,1027240,1027722,1030009,1030073,1032213,1032452,1032931,1035914,1036125,1038855,1039370,1040886,1041993,1042749,1043111,1050003,1051948,1052264,1053376,1053955,1057635,1059291,1059758,1060230,1061407,1062462,1062464,1063419,1064520,1065792,1068446,1068566,1071322,1072599,1075950,1079048,1081592,1083110,1087055,1087278,1087581,1087891,1088888,1089112,1089362,1089526,1091371,1092161,1092373,1094055,1095507,1095651,1095942,1096514,1097174,1097413,1098394,1099323,1099460,1099887,1099945,1100142,1100225,1100697,1101780,1101812,1101880,1102013,1102218,1102248,1102265,1102819,1103530,1104154,1104491,1106164,1107333,1108557,1108834,1108969,1108995,1109893,1110938,1112874,1113698,1113699,1113784,1114029,1114197,1114474,1114824,1116343,1116837,1117995,1121091,1121439,1122663,1122680,1123044,1123512,1123865,1124277,1125015,1128061,1128554,1129079,1130588,113078 4,1131114,1132076,1133523,1133647,1134860,1135360,1135507,1135567,1135656,1135732,1137642,1138952,1139761,1140193,1140912,1143301,1146192,1146382,1148714,1150447,1151650,1151947,1152366,1153611,1154620,1157465,1157479,1158441,1158940,1159118,1159284,1159670,1160931,1162327,1162504,1165425,1165572,1167437,1167556,1168340,1169604,1169800,1170042,1170104,1170288,1170595,1171461,1171906,1172075,1172211,1173072,1173909,1173911,1173936,1174165,1175549,1175987,1176024,1176294,1176397,1176480,1177867,1178319,1178361,1178362,1178485,849184,849204,849205,955373,958350,959572,963322,965403,967803,969320,970669,971372,972311,972490,975093,975303,975306,975733,975757,976148,978150,978833,979448,979676,980313,983017,983512,985112,985661,986019,988506,989193,989798,990029,990439,990440,991048,993039,993549,996455,999852 CVE References: CVE-2016-1866,CVE-2016-9639,CVE-2017-12791,CVE-2017-14695,CVE-2017-14696,CVE-2018-15750,CVE-2018-15751,CVE-2019-17361,CVE-2019-18897,CVE-2020-11651,CVE-2020-11652,CVE-2020-16846,CVE-2020-17490,CVE-2020-25592 JIRA References: Sources used:
NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.