[Bug 1171257] New: salt doesn't work anymore
http://bugzilla.suse.com/show_bug.cgi?id=1171257 Bug ID: 1171257 Summary: salt doesn't work anymore Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Critical Priority: P5 - None Component: Kubic Assignee: kubic-bugs@opensuse.org Reporter: kukuk@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Salt doesn't work anymore in Factory, communication with Minions not possible. Minions report itself to the master, you can accept the key, but aftwards, you only get timeouts: # salt '*' test.ping /usr/lib/python3.8/site-packages/salt/ext/tornado/httputil.py:107: DeprecationWarning: Using or importing the ABCs from 'collections' instead of from 'collections.abc' is deprecated since Python 3.3, and in 3.9 it will stop working class HTTPHeaders(collections.MutableMapping): kubic-2.demo: Minion did not return. [No response] ERROR: Minions returned with non-zero exit code I cannot find anything more/relevant in the logs. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 Alberto Planas Dominguez <aplanas@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |aplanas@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c1 Richard Brown <rbrown@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |pablo.suarezhernandez@suse. | |com, rbrown@suse.com Assignee|kubic-bugs@opensuse.org |pablo.suarezhernandez@suse. | |com Flags| |needinfo?(pablo.suarezherna | |ndez@suse.com) --- Comment #1 from Richard Brown <rbrown@suse.com> --- problem seems to impact all salt in Tumbleweed, not just Kubic Pablo as the most recent salt maintainer can you look or reassign to the appropriate person? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c2 --- Comment #2 from Alberto Planas Dominguez <aplanas@suse.com> --- Confirmed that is in a plain Tumbleweed. salt-call works, tho. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c3 --- Comment #3 from Alberto Planas Dominguez <aplanas@suse.com> --- Some errors that I see on the master: [DEBUG ] LazyLoaded local_cache.prep_jid [DEBUG ] Sending event: tag = 20200506112531080684; data = {'minions': ['10.0.2.15'], '_stamp': '2020-05-06T11:25:31.094373'} [DEBUG ] Sending event: tag = salt/job/20200506112531080684/new; data = {'jid': '20200506112531080684', 'tgt_type': 'glob', 'tgt': '*', 'user': 'root', 'fun': 'test.ping', 'arg': [], 'minions': ['10.0.2.15'], 'missing': [], '_stamp': '2020-05-06T11:25:31.097904'} [DEBUG ] Adding minions for job 20200506112531080684: ['10.0.2.15'] [INFO ] User root Published command test.ping with jid 20200506112531080684 [DEBUG ] Published command details {'fun': 'test.ping', 'arg': [], 'tgt': '*', 'jid': '20200506112531080684', 'ret': '', 'tgt_type': 'glob', 'user': 'root'} [DEBUG ] Signing data packet [DEBUG ] salt.crypt.get_rsa_key: Loading private key [DEBUG ] salt.crypt.sign_message: Signing message. [DEBUG ] Sending payload to publish daemon. jid=20200506112531080684 size=436 [DEBUG ] Connecting to pub server: ipc:///var/run/salt/master/publish_pull.ipc [DEBUG ] Sent payload to publish daemon. [DEBUG ] Publish daemon received payload. size=436 Process salt.transport.zeromq.<class 'method'>._publish_daemon: Traceback (most recent call last): File "/usr/lib64/python3.8/multiprocessing/process.py", line 315, in _bootstrap self.run() File "/usr/lib64/python3.8/multiprocessing/process.py", line 108, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/site-packages/salt/transport/zeromq.py", line 920, in _publish_daemon unpacked_package = salt.payload.unpackage(package) File "/usr/lib/python3.8/site-packages/salt/payload.py", line 47, in unpackage return salt.utils.msgpack.loads(package_, use_list=True) File "/usr/lib/python3.8/site-packages/salt/utils/msgpack.py", line 128, in unpackb return msgpack.unpackb(packed, **_sanitize_msgpack_kwargs(kwargs)) File "msgpack/_unpacker.pyx", line 195, in msgpack._cmsgpack.unpackb UnicodeDecodeError: 'utf-8' codec can't decode byte 0x83 in position 0: invalid start byte [INFO ] Worker binding to socket ipc:///var/run/salt/master/workers.ipc A bit later I can also see this: [DEBUG ] Adding minions for job 20200506112536159600: ['10.0.2.15'] [INFO ] User root Published command saltutil.find_job with jid 20200506112536159600 [DEBUG ] Published command details {'fun': 'saltutil.find_job', 'arg': ['20200506112531080684'], 'tgt': ['10.0.2.15'], 'jid': '20200506112536159600', 'ret': '', 'tgt_type': 'list', 'user': 'root'} [DEBUG ] Signing data packet [DEBUG ] salt.crypt.get_rsa_key: Loading private key [DEBUG ] salt.crypt.sign_message: Signing message. [DEBUG ] Sending payload to publish daemon. jid=20200506112536159600 size=489 [DEBUG ] Sent payload to publish daemon. [INFO ] Process <bound method ZeroMQPubServerChannel._publish_daemon of <salt.transport.zeromq.ZeroMQPubServerChannel object at 0x7f791113f550>> (4011) died with exit status 1, restarting... [DEBUG ] Started 'salt.transport.zeromq.<class 'method'>._publish_daemon' with pid 4786 [ERROR ] Future <salt.ext.tornado.concurrent.Future object at 0x7f790fce4ac0> exception was never retrieved: Traceback (most recent call last): File "/usr/lib/python3.8/site-packages/salt/ext/tornado/gen.py", line 309, in wrapper yielded = next(result) File "/usr/lib/python3.8/site-packages/salt/utils/process.py", line 531, in run self.check_children() File "/usr/lib/python3.8/site-packages/salt/utils/process.py", line 556, in check_children for pid, mapping in six.iteritems(self._process_map): RuntimeError: dictionary keys changed during iteration [INFO ] Starting the Salt Publisher on tcp://0.0.0.0:4505 [INFO ] Starting the Salt Puller on ipc:///var/run/salt/master/publish_pull.ipc [DEBUG ] Publish daemon getting data from puller ipc:///var/run/salt/master/publish_pull.ipc [DEBUG ] Publish daemon received payload. size=489 Process salt.transport.zeromq.<class 'method'>._publish_daemon: Traceback (most recent call last): File "/usr/lib64/python3.8/multiprocessing/process.py", line 315, in _bootstrap self.run() File "/usr/lib64/python3.8/multiprocessing/process.py", line 108, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/site-packages/salt/transport/zeromq.py", line 920, in _publish_daemon unpacked_package = salt.payload.unpackage(package) File "/usr/lib/python3.8/site-packages/salt/payload.py", line 47, in unpackage return salt.utils.msgpack.loads(package_, use_list=True) File "/usr/lib/python3.8/site-packages/salt/utils/msgpack.py", line 128, in unpackb return msgpack.unpackb(packed, **_sanitize_msgpack_kwargs(kwargs)) File "msgpack/_unpacker.pyx", line 195, in msgpack._cmsgpack.unpackb UnicodeDecodeError: 'utf-8' codec can't decode byte 0x83 in position 0: invalid start byte [DEBUG ] Performing fileserver updates for items with an update interval of 60 [DEBUG ] Updating roots fileserver cache -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 Jochen Breuer <jbreuer@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jbreuer@suse.com Assignee|pablo.suarezhernandez@suse. |jbreuer@suse.com |com | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c4 Jochen Breuer <jbreuer@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(pablo.suarezherna |needinfo?(jbreuer@suse.com) |ndez@suse.com) | --- Comment #4 from Jochen Breuer <jbreuer@suse.com> --- (In reply to Alberto Planas Dominguez from comment #3)
Some errors that I see on the master:
[DEBUG ] LazyLoaded local_cache.prep_jid [DEBUG ] Sending event: tag = 20200506112531080684; data = {'minions': ['10.0.2.15'], '_stamp': '2020-05-06T11:25:31.094373'} [DEBUG ] Sending event: tag = salt/job/20200506112531080684/new; data = {'jid': '20200506112531080684', 'tgt_type': 'glob', 'tgt': '*', 'user': 'root', 'fun': 'test.ping', 'arg': [], 'minions': ['10.0.2.15'], 'missing': [], '_stamp': '2020-05-06T11:25:31.097904'} [DEBUG ] Adding minions for job 20200506112531080684: ['10.0.2.15'] [INFO ] User root Published command test.ping with jid 20200506112531080684 [DEBUG ] Published command details {'fun': 'test.ping', 'arg': [], 'tgt': '*', 'jid': '20200506112531080684', 'ret': '', 'tgt_type': 'glob', 'user': 'root'} [DEBUG ] Signing data packet [DEBUG ] salt.crypt.get_rsa_key: Loading private key [DEBUG ] salt.crypt.sign_message: Signing message. [DEBUG ] Sending payload to publish daemon. jid=20200506112531080684 size=436 [DEBUG ] Connecting to pub server: ipc:///var/run/salt/master/publish_pull.ipc [DEBUG ] Sent payload to publish daemon. [DEBUG ] Publish daemon received payload. size=436 Process salt.transport.zeromq.<class 'method'>._publish_daemon: Traceback (most recent call last): File "/usr/lib64/python3.8/multiprocessing/process.py", line 315, in _bootstrap self.run() File "/usr/lib64/python3.8/multiprocessing/process.py", line 108, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/site-packages/salt/transport/zeromq.py", line 920, in _publish_daemon unpacked_package = salt.payload.unpackage(package) File "/usr/lib/python3.8/site-packages/salt/payload.py", line 47, in unpackage return salt.utils.msgpack.loads(package_, use_list=True) File "/usr/lib/python3.8/site-packages/salt/utils/msgpack.py", line 128, in unpackb return msgpack.unpackb(packed, **_sanitize_msgpack_kwargs(kwargs)) File "msgpack/_unpacker.pyx", line 195, in msgpack._cmsgpack.unpackb UnicodeDecodeError: 'utf-8' codec can't decode byte 0x83 in position 0: invalid start byte [INFO ] Worker binding to socket ipc:///var/run/salt/master/workers.ipc
A bit later I can also see this:
[DEBUG ] Adding minions for job 20200506112536159600: ['10.0.2.15'] [INFO ] User root Published command saltutil.find_job with jid 20200506112536159600 [DEBUG ] Published command details {'fun': 'saltutil.find_job', 'arg': ['20200506112531080684'], 'tgt': ['10.0.2.15'], 'jid': '20200506112536159600', 'ret': '', 'tgt_type': 'list', 'user': 'root'} [DEBUG ] Signing data packet [DEBUG ] salt.crypt.get_rsa_key: Loading private key [DEBUG ] salt.crypt.sign_message: Signing message. [DEBUG ] Sending payload to publish daemon. jid=20200506112536159600 size=489 [DEBUG ] Sent payload to publish daemon. [INFO ] Process <bound method ZeroMQPubServerChannel._publish_daemon of <salt.transport.zeromq.ZeroMQPubServerChannel object at 0x7f791113f550>> (4011) died with exit status 1, restarting... [DEBUG ] Started 'salt.transport.zeromq.<class 'method'>._publish_daemon' with pid 4786 [ERROR ] Future <salt.ext.tornado.concurrent.Future object at 0x7f790fce4ac0> exception was never retrieved: Traceback (most recent call last): File "/usr/lib/python3.8/site-packages/salt/ext/tornado/gen.py", line 309, in wrapper yielded = next(result) File "/usr/lib/python3.8/site-packages/salt/utils/process.py", line 531, in run self.check_children() File "/usr/lib/python3.8/site-packages/salt/utils/process.py", line 556, in check_children for pid, mapping in six.iteritems(self._process_map): RuntimeError: dictionary keys changed during iteration [INFO ] Starting the Salt Publisher on tcp://0.0.0.0:4505 [INFO ] Starting the Salt Puller on ipc:///var/run/salt/master/publish_pull.ipc [DEBUG ] Publish daemon getting data from puller ipc:///var/run/salt/master/publish_pull.ipc [DEBUG ] Publish daemon received payload. size=489 Process salt.transport.zeromq.<class 'method'>._publish_daemon: Traceback (most recent call last): File "/usr/lib64/python3.8/multiprocessing/process.py", line 315, in _bootstrap self.run() File "/usr/lib64/python3.8/multiprocessing/process.py", line 108, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/site-packages/salt/transport/zeromq.py", line 920, in _publish_daemon unpacked_package = salt.payload.unpackage(package) File "/usr/lib/python3.8/site-packages/salt/payload.py", line 47, in unpackage return salt.utils.msgpack.loads(package_, use_list=True) File "/usr/lib/python3.8/site-packages/salt/utils/msgpack.py", line 128, in unpackb return msgpack.unpackb(packed, **_sanitize_msgpack_kwargs(kwargs)) File "msgpack/_unpacker.pyx", line 195, in msgpack._cmsgpack.unpackb UnicodeDecodeError: 'utf-8' codec can't decode byte 0x83 in position 0: invalid start byte [DEBUG ] Performing fileserver updates for items with an update interval of 60 [DEBUG ] Updating roots fileserver cache
Weird! I just did a fresh install and I don't get a UnicodeDecodeError. But I can confirm that it's not working and that there seems to be the return missing. I've tested the same package (3000.2) for Leap 15.1 (Python 3.6) and this is working. So I guess we are running into a Python 3.8 problem. I'll do some cherry-picks that upstream did for Python 3.8 compatiblity and then I'll re-run my tests. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c5 --- Comment #5 from Alberto Planas Dominguez <aplanas@suse.com> --- (In reply to Jochen Breuer from comment #4)
Weird! I just did a fresh install and I don't get a UnicodeDecodeError.
Right. You only see the exception the first time, when you restart the salt-master, later there is no call to payload.unpackage anymore, not sure why.
But I can confirm that it's not working and that there seems to be the return missing. I've tested the same package (3000.2) for Leap 15.1 (Python 3.6) and this is working. So I guess we are running into a Python 3.8 problem. I'll do some cherry-picks that upstream did for Python 3.8 compatiblity and then I'll re-run my tests.
Good catch, can be indeed a Python 3.8 issue. The fact that I cannot see any later call to payload.unpackage makes me wonder if there are not two bugs here at least. Following the payload asset, looks weird that is using this unpackage function helper here, as the payload is AES encrypted and nested under a dict, where the payload is also serialized. The UTF error is over the inner payload that also require de-serialization. -- You are receiving this mail because: You are on the CC list for the bug.
From the kubic mailinglist we've had at least one report that is having the exact same issue, but they can't create a bugzilla account, probably because of
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c6 --- Comment #6 from Richard Brown <rbrown@suse.com> --- the upcoming maintenance work. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 Alberto Planas Dominguez <aplanas@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|salt doesn't work anymore |Minion did not return. [No | |response] on salt under | |Python 3.8 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c7 --- Comment #7 from Alberto Planas Dominguez <aplanas@suse.com> --- One bit more of information, after the first exception from unpackb, the salt-master process listening to 4505 (publisher) dies and the socket gets closed for subsequent calls. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c8 --- Comment #8 from Alberto Planas Dominguez <aplanas@suse.com> --- Found the bug, is a change in msgpack 1.0, Salt require a minimal patch. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c9 --- Comment #9 from Jochen Breuer <jbreuer@suse.com> --- (In reply to Alberto Planas Dominguez from comment #8)
Found the bug, is a change in msgpack 1.0, Salt require a minimal patch.
Good catch! I can confirm. Are you already working on a fix? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c10 --- Comment #10 from Alberto Planas Dominguez <aplanas@suse.com> --- (In reply to Jochen Breuer from comment #9)
(In reply to Alberto Planas Dominguez from comment #8)
Found the bug, is a change in msgpack 1.0, Salt require a minimal patch.
Good catch! I can confirm. Are you already working on a fix?
I am adding something in _sanitize_msgpack_kwargs(kwargs) that will add the raw parameter for versions >= 1, still testing. If you find a better fix sure do that. As this is super urgent (break all kubic deployments) we need to have something in our package ASAP. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1171257 http://bugzilla.suse.com/show_bug.cgi?id=1171257#c11 --- Comment #11 from Alberto Planas Dominguez <aplanas@suse.com> --- @Jochen: https://github.com/openSUSE/salt/pull/234 The upstream is: https://github.com/saltstack/salt/pull/57122 As I do not control properly the live cycle of the package, can you add the patch into the correct packages in OBS? Thanks! PS: also can you double-test the patch? With this black at the end I needed to change the code a bit from the one that I tested in my VMs. (I leave the bug from here) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c20 --- Comment #20 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:14623-1: An update that solves four vulnerabilities and has 19 fixes is now available. Category: security (moderate) Bug References: 1083110,1157479,1158441,1159284,1162504,1163981,1165425,1167556,1169604,1171257,1171461,1172211,1173909,1173911,1175549,1176293,1176823,1178319,1178361,1178362,1178485,1179566,1180584 CVE References: CVE-2019-17361,CVE-2020-16846,CVE-2020-17490,CVE-2020-25592 JIRA References: Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c21 --- Comment #21 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:14624-1: An update that solves four vulnerabilities and has 19 fixes is now available. Category: security (moderate) Bug References: 1083110,1157479,1158441,1159284,1162504,1163981,1165425,1167556,1169604,1171257,1171461,1172211,1173909,1173911,1175549,1176293,1176823,1178319,1178361,1178362,1178485,1179566,1180584 CVE References: CVE-2019-17361,CVE-2020-16846,CVE-2020-17490,CVE-2020-25592 JIRA References: Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c22 --- Comment #22 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0480-1: An update that solves four vulnerabilities and has 19 fixes is now available. Category: security (moderate) Bug References: 1083110,1157479,1158441,1159284,1162504,1163981,1165425,1167556,1169604,1171257,1171461,1172211,1173909,1173911,1175549,1176293,1176823,1178319,1178361,1178362,1178485,1179566,1180584 CVE References: CVE-2019-17361,CVE-2020-16846,CVE-2020-17490,CVE-2020-25592 JIRA References: Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c31 --- Comment #31 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:14733-1: An update that solves 11 vulnerabilities, contains one feature and has 17 fixes is now available. Category: security (moderate) Bug References: 1099976,1171257,1172110,1174855,1176293,1177474,1179831,1180101,1180818,1181290,1181347,1181368,1181550,1181556,1181557,1181558,1181559,1181560,1181561,1181562,1181563,1181564,1181565,1182281,1182293,1182740,1185092,1185281 CVE References: CVE-2020-28243,CVE-2020-28972,CVE-2020-35662,CVE-2021-25281,CVE-2021-25282,CVE-2021-25283,CVE-2021-25284,CVE-2021-3144,CVE-2021-3148,CVE-2021-31607,CVE-2021-3197 JIRA References: ECO-3212 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c32 --- Comment #32 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:14734-1: An update that solves 11 vulnerabilities, contains one feature and has 17 fixes is now available. Category: security (moderate) Bug References: 1099976,1171257,1172110,1174855,1176293,1177474,1179831,1180101,1180818,1181290,1181347,1181368,1181550,1181556,1181557,1181558,1181559,1181560,1181561,1181562,1181563,1181564,1181565,1182281,1182293,1182740,1185092,1185281 CVE References: CVE-2020-28243,CVE-2020-28972,CVE-2020-35662,CVE-2021-25281,CVE-2021-25282,CVE-2021-25283,CVE-2021-25284,CVE-2021-3144,CVE-2021-3148,CVE-2021-31607,CVE-2021-3197 JIRA References: ECO-3212 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c33 --- Comment #33 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:1690-1: An update that solves 11 vulnerabilities, contains one feature and has 17 fixes is now available. Category: security (moderate) Bug References: 1099976,1171257,1172110,1174855,1176293,1177474,1179831,1180101,1180818,1181290,1181347,1181368,1181550,1181556,1181557,1181558,1181559,1181560,1181561,1181562,1181563,1181564,1181565,1182281,1182293,1182740,1185092,1185281 CVE References: CVE-2020-28243,CVE-2020-28972,CVE-2020-35662,CVE-2021-25281,CVE-2021-25282,CVE-2021-25283,CVE-2021-25284,CVE-2021-3144,CVE-2021-3148,CVE-2021-31607,CVE-2021-3197 JIRA References: ECO-3212 Sources used: SUSE Manager Tools 15-BETA (src): salt-3002.2-8.41.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c34 --- Comment #34 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:1694-1: An update that solves 11 vulnerabilities, contains one feature and has 17 fixes is now available. Category: security (moderate) Bug References: 1099976,1171257,1172110,1174855,1176293,1177474,1179831,1180101,1180818,1181290,1181347,1181368,1181550,1181556,1181557,1181558,1181559,1181560,1181561,1181562,1181563,1181564,1181565,1182281,1182293,1182740,1185092,1185281 CVE References: CVE-2020-28243,CVE-2020-28972,CVE-2020-35662,CVE-2021-25281,CVE-2021-25282,CVE-2021-25283,CVE-2021-25284,CVE-2021-3144,CVE-2021-3148,CVE-2021-31607,CVE-2021-3197 JIRA References: ECO-3212 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c37 --- Comment #37 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2104-1: An update that solves two vulnerabilities, contains three features and has 8 fixes is now available. Category: security (critical) Bug References: 1171257,1176293,1179831,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: SUSE Linux Enterprise Server for SAP 15 (src): salt-3002.2-8.41.8.1 SUSE Linux Enterprise Server 15-LTSS (src): salt-3002.2-8.41.8.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): salt-3002.2-8.41.8.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): salt-3002.2-8.41.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c38 --- Comment #38 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2111-1: An update that solves two vulnerabilities, contains three features and has 12 fixes is now available. Category: security (moderate) Bug References: 1171257,1173557,1176293,1179831,1180583,1180584,1180585,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c39 --- Comment #39 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2105-1: An update that solves 7 vulnerabilities, contains three features and has three fixes is now available. Category: security (critical) Bug References: 1171257,1176293,1179831,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2018-15750,CVE-2018-15751,CVE-2020-11651,CVE-2020-11652,CVE-2020-25592,CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: SUSE Manager Server 4.0 (src): salt-3002.2-37.1 SUSE Manager Retail Branch Server 4.0 (src): salt-3002.2-37.1 SUSE Manager Proxy 4.0 (src): salt-3002.2-37.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): salt-3002.2-37.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): salt-3002.2-37.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): salt-3002.2-37.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): salt-3002.2-37.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): salt-3002.2-37.1 SUSE Enterprise Storage 6 (src): salt-3002.2-37.1 SUSE CaaS Platform 4.0 (src): salt-3002.2-37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c40 --- Comment #40 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:14756-1: An update that solves two vulnerabilities, contains three features and has 12 fixes is now available. Category: security (moderate) Bug References: 1171257,1173557,1176293,1179831,1180583,1180584,1180585,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c41 --- Comment #41 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2106-1: An update that solves 7 vulnerabilities, contains three features and has three fixes is now available. Category: security (critical) Bug References: 1171257,1176293,1179831,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2018-15750,CVE-2018-15751,CVE-2020-11651,CVE-2020-11652,CVE-2020-25592,CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: SUSE MicroOS 5.0 (src): python-distro-1.5.0-3.5.1, salt-3002.2-37.1 SUSE Linux Enterprise Module for Transactional Server 15-SP2 (src): salt-3002.2-37.1 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): salt-3002.2-37.1 SUSE Linux Enterprise Module for Python2 15-SP3 (src): python-distro-1.5.0-3.5.1 SUSE Linux Enterprise Module for Python2 15-SP2 (src): python-distro-1.5.0-3.5.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): python-distro-1.5.0-3.5.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): python-distro-1.5.0-3.5.1, salt-3002.2-37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c42 --- Comment #42 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:14755-1: An update that solves two vulnerabilities, contains three features and has 12 fixes is now available. Category: security (moderate) Bug References: 1171257,1173557,1176293,1179831,1180583,1180584,1180585,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c43 --- Comment #43 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:0899-1: An update that solves 7 vulnerabilities, contains three features and has three fixes is now available. Category: security (critical) Bug References: 1171257,1176293,1179831,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2018-15750,CVE-2018-15751,CVE-2020-11651,CVE-2020-11652,CVE-2020-25592,CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: openSUSE Leap 15.2 (src): salt-3002.2-lp152.3.36.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1171257 https://bugzilla.suse.com/show_bug.cgi?id=1171257#c44 --- Comment #44 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:2106-1: An update that solves 7 vulnerabilities, contains three features and has three fixes is now available. Category: security (critical) Bug References: 1171257,1176293,1179831,1181368,1182281,1182293,1182382,1185092,1185281,1186674 CVE References: CVE-2018-15750,CVE-2018-15751,CVE-2020-11651,CVE-2020-11652,CVE-2020-25592,CVE-2021-25315,CVE-2021-31607 JIRA References: ECO-3212,SLE-18028,SLE-18033 Sources used: openSUSE Leap 15.3 (src): python-distro-1.5.0-3.5.1 -- You are receiving this mail because: You are on the CC list for the bug.
participants (2)
-
bugzilla_noreply@novell.com
-
bugzilla_noreply@suse.com