[Bug 1166965] New: kernel-docs fail to build occasionally with python 3.8
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Bug ID: 1166965 Summary: kernel-docs fail to build occasionally with python 3.8 Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Other Assignee: screening-team-bugs@suse.de Reporter: jslaby@suse.com QA Contact: qa-bugs@suse.de CC: mkubecek@suse.com Depends on: 1158289 Found By: --- Blocker: --- kernel-docs need 8.2G of memory with python 3.8 now. It used to be 2.2G on SLE15-SP2 (python 3.6). I don't have numbers for 3.7, but the build did not fail in factory, now it fails quite often.
[ 776s] writing output... [ 55%] media/uapi/dvb/audio-continue .. media/uapi/dvb/frontend-property-terrestrial-systems [ 783s] [ 768.244238] Out of memory: Killed process 4174 (sphinx-build) total-vm:1256996kB, anon-rss:517292kB, file-rss:0kB, shmem-rss:0kB, UID:399 pgtables:2508kB oom_score_adj:0 [ 842s] writing output... [ 59%] media/uapi/dvb/frontend-stat-properties .. media/uapi/rc/lirc-set-wideband-receiver [ 847s] [ 847s] Exception occurred: [ 847s] File "/usr/lib64/python3.8/multiprocessing/connection.py", line 383, in _recv [ 847s] raise EOFError [ 847s] EOFError
I indeed can increase the constraints, but 4 times larger memory footprint is too much... This must be a bug or leak. https://build.opensuse.org/packages/kernel-docs/job_history/Kernel:stable/st... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1158289 Depends on|1158289 | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Matej Cepl <mcepl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mcepl@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Hans-Peter Jansen <hpj@urpla.net> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |hpj@urpla.net -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Tomáš Chvátal <tchvatal@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|screening-team-bugs@suse.de |steven.kowalik@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c2 Matej Cepl <mcepl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jslaby@suse.com Flags| |needinfo?(jslaby@suse.com) --- Comment #2 from Matej Cepl <mcepl@suse.com> --- Could you please *ATTACH* (not link) build log (preferably on x86_64) when it fails, please? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c3 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(jslaby@suse.com) | --- Comment #3 from Jiri Slaby <jslaby@suse.com> --- Created attachment 833817 --> http://bugzilla.suse.com/attachment.cgi?id=833817&action=edit log from failed run -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c4 --- Comment #4 from Jiri Slaby <jslaby@suse.com> --- (In reply to Matej Cepl from comment #2)
Could you please *ATTACH* (not link) build log (preferably on x86_64) when it fails, please?
I am not sure what that is good for, but I attached it anyway. Even if it does not fail, it still consumes 8G of memory. So be it failed or successful build, the leak is still there... More interesting would be to run it locally and measure python memory footprint with 3.6/3.7 and 3.8. Maybe with some valgrind-for-python thing, if there is any... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c5 --- Comment #5 from Jiri Slaby <jslaby@suse.com> --- Created attachment 833818 --> http://bugzilla.suse.com/attachment.cgi?id=833818&action=edit log from failed run (x86_64) The same from x86_64. Again, nothing interesting there. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c6 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #833818|0 |1 is obsolete| | --- Comment #6 from Jiri Slaby <jslaby@suse.com> --- Created attachment 834805 --> http://bugzilla.suse.com/attachment.cgi?id=834805&action=edit another x86_64 failure Any updates on this? It's easily reproducible by: osc build -j4 --vm-type kvm --vm-memory=3000 vs. osc build -j4 --vm-type kvm --vm-memory=3000 --alternative-project openSUSE:Leap:15.1:Update The first fails, the second does not. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c7 --- Comment #7 from Steve Kowalik <steven.kowalik@suse.com> --- Leap 15.1 uses Sphinx 1.7.6, and Tumbleweed uses Sphinx 2.4.4 (currently), as well as the different Python interpreter versions. I've been working on this along with my other duties, but currently in my testing, I can see the children of sphinx-build are using 1GiB of RAM each, but I'm still investigating. I will look at downgrading Sphinx locally and see what memory profiling turns up. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c8 --- Comment #8 from Michal Kubeček <mkubecek@suse.com> --- Created attachment 834926 --> http://bugzilla.suse.com/attachment.cgi?id=834926&action=edit OBS job history of Kernel:HEAD and Kernel:stable Looking at the attached "osc jobhist" outputs, it seems that whatever caused these build failures, it happened between 2020-02-28 and 2020-03-02. Of course, it's possible that it was only some change in OBS configuration resulting in getting "smaller" builders more often than before. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c9 --- Comment #9 from Michal Kubeček <mkubecek@suse.com> --- As there was no successful ppc64le build since 2020-02-28, I also tried do get the statistics of last successful build using "osc getbinaries". The memory consumption was Kernel:HEAD 2763 MB Kernel:stable 2684 MB which is a bit higher than with older versions of the toolchain: Kernel:openSUSE-15.1 2396 MB Kernel:openSUSE-15.2 2350 MB but nowhere near four times higher. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c10 --- Comment #10 from Michal Kubeček <mkubecek@suse.com> --- Unfortunately "osc getbinaries" does not provide the build log and I have no idea how to identify version from the hdrmd5 attribute but the last successful build on ppc64le shows "libpython3_7m1_0" among installed packages while current (failing) build log shows "libpython3_8-1_0-3.8.2-2.1". So I guess we are back at the theory that this may be related to changes between python 3.7 and 3.8. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c11 --- Comment #11 from Jiri Slaby <jslaby@suse.com> ---
From IBS:
Standard kernel Devel:Kernel:stable/kernel-docs/standard/x86_64 Maximal used memory: 7096 Mbyte With sphinx from leap 15.2 home:jirislaby:kernel_docs_sphinx/kernel-docs/SUSE_Factory_Head/x86_64 Maximal used memory: 1830 Mbyte With python 3.7 home:jirislaby:kernel_docs_python/kernel-docs/SUSE_Factory_Head/x86_64 Maximal used memory: 7593 Mbyte So there is little difference between py 3.7 & 3.8. There is a huge difference between sphinx 1.7.6 and 2.4.4. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c12 --- Comment #12 from Steve Kowalik <steven.kowalik@suse.com> --- I will start on downgrading Sphinx versions locally to see if I can nail down to which release of Sphinx caused the massive RAM increase. But we can at least rule out Python interpreter changes. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c13 --- Comment #13 from Jiri Slaby <jslaby@suse.com> --- (In reply to Michal Kubeček from comment #8)
Created attachment 834926 [details] OBS job history of Kernel:HEAD and Kernel:stable
Looking at the attached "osc jobhist" outputs, it seems that whatever caused these build failures, it happened between 2020-02-28 and 2020-03-02.
https://build.opensuse.org/request/show/779133 fits in there. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c14 --- Comment #14 from Michal Kubeček <mkubecek@suse.com> --- I checked /var/log/zypp/history in the Tumbleweed chroot I'm using for config updates, I see 2019-12-09 08:47:07|install|libpython3_7m1_0|3.7.3-1.4 ... 2020-03-09 06:36:00|install|vim|8.2.0348-1.1 ... 2020-03-13 08:02:04|install|libpython3_8-1_0|3.8.2-1.1 So it seems python 3.8 wasn't available in TW repositories until after March 9. On the other hand, there was an update of python3-Sphinx before that: 2020-01-03 08:31:14|install|python3-Sphinx|2.3.1-1.1 2020-03-09 06:34:55|install|python3-Sphinx|2.4.3-1.1 I also ran "zypper dup" on 2020-03-02 but that that was quite early so it's possible that the first failing builds already used python3-Sphinx 2.4.3. So it indeed seems that the problem started between sphinx 2.3.1 and 2.4.3. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c15 --- Comment #15 from Jiri Slaby <jslaby@suse.com> --- Rev 61 of sphinx (2.3.1) Maximal used memory: 2039 Mbyte Rev 62 of sphinx (2.4.3) Maximal used memory: 8145 Mbyte -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 --- Comment #16 from Steve Kowalik <steven.kowalik@suse.com> --- My current testing has shown: 2.3.1: Maximum: 2455.90MiB 2.4.0: Maximum: 6736.48MiB 2.4.1: Maximum: 6622.50MiB 2.4.2: Maximum: 6635.35MiB 2.4.3: Maximum: 6706.11MiB 2.4.4: Maximum: 6548.39MiB 3.0.0*: Maximum: 2505.21MiB [*]: Released yesterday, requires a patch to conf.py due to cdomain changes, and given the whole heap of warnings printed, I'm not confident about the quality of the resultant docs anyway. I think we'll revert Factory to Sphinx 2.3.1 until the kernel supports 3.0.0. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|kernel-docs fail to build |kernel-docs fail to build |occasionally with python |occasionally with |3.8 |python-Sphinx 2.4 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 http://bugzilla.suse.com/show_bug.cgi?id=1166965#c17 Steve Kowalik <steven.kowalik@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CONFIRMED --- Comment #17 from Steve Kowalik <steven.kowalik@suse.com> --- https://build.opensuse.org/request/show/791929 is my SR to revert to 2.3.1 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Matej Cepl <mcepl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|CONFIRMED |IN_PROGRESS -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1166965 Tomáš Chvátal <tchvatal@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks|1158289 | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c19 --- Comment #19 from OBSbugzilla Bot <bwiedemann+obsbugzillabot@suse.com> --- This is an autogenerated message for OBS integration: This bug (1166965) was mentioned in https://build.opensuse.org/request/show/831128 15.1 / kernel-source -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c21 --- Comment #21 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2020:1325-1: An update that solves 6 vulnerabilities and has 107 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1071995,1083548,1085030,1085308,1087082,1111666,1112178,1113956,1133021,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171688,1172073,1172108,1172418,1172428,1172783,1172871,1172872,1172873,1172963,1173485,1173798,1173954,1174003,1174026,1174205,1174387,1174484,1174547,1174550,1174625,1174689,1174699,1174734,1174771,1174852,1174873,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,1175666,1175667,1175668,1175669,1175670,1175767,1175768,1175769,1175770,1175771,1175772,1175786,1175873 CVE References: CVE-2018-3639,CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: openSUSE Leap 15.1 (src): kernel-debug-4.12.14-lp151.28.63.1, kernel-default-4.12.14-lp151.28.63.1, kernel-docs-4.12.14-lp151.28.63.1, kernel-kvmsmall-4.12.14-lp151.28.63.1, kernel-obs-build-4.12.14-lp151.28.63.1, kernel-obs-qa-4.12.14-lp151.28.63.1, kernel-source-4.12.14-lp151.28.63.1, kernel-syms-4.12.14-lp151.28.63.1, kernel-vanilla-4.12.14-lp151.28.63.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c23 --- Comment #23 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2541-1: An update that solves 7 vulnerabilities and has 130 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1071995,1074701,1083548,1085030,1085235,1085308,1087078,1087082,1094912,1100394,1102640,1105412,1111666,1112178,1113956,1120163,1133021,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171688,1171988,1172073,1172108,1172247,1172418,1172428,1172781,1172782,1172783,1172871,1172872,1172873,1172963,1173485,1173798,1173954,1174003,1174026,1174070,1174161,1174205,1174387,1174484,1174547,1174549,1174550,1174625,1174658,1174685,1174689,1174699,1174734,1174757,1174771,1174840,1174841,1174843,1174844,1174845,1174852,1174873,1174887,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,117566 6,1175667,1175668,1175669,1175670,1175767,1175768,1175769,1175770,1175771,1175772,1175786,1175873 CVE References: CVE-2020-10135,CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-16166,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src): kernel-azure-4.12.14-8.41.1, kernel-source-azure-4.12.14-8.41.1, kernel-syms-azure-4.12.14-8.41.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c24 --- Comment #24 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2540-1: An update that solves 7 vulnerabilities and has 129 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1071995,1074701,1083548,1085030,1085235,1085308,1087078,1087082,1094912,1100394,1102640,1105412,1111666,1112178,1113956,1120163,1133021,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171688,1172073,1172108,1172247,1172418,1172428,1172781,1172782,1172783,1172871,1172872,1172873,1172963,1173485,1173798,1173954,1174003,1174026,1174070,1174161,1174205,1174247,1174387,1174484,1174547,1174550,1174625,1174658,1174685,1174689,1174699,1174734,1174757,1174771,1174840,1174841,1174843,1174844,1174845,1174852,1174873,1174887,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,1175666,117566 7,1175668,1175669,1175670,1175767,1175768,1175769,1175770,1175771,1175772,1175786,1175873 CVE References: CVE-2018-3639,CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-16166,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): kernel-azure-4.12.14-16.25.1, kernel-source-azure-4.12.14-16.25.1, kernel-syms-azure-4.12.14-16.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c26 --- Comment #26 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2574-1: An update that solves 7 vulnerabilities and has 131 fixes is now available. Category: security (important) Bug References: 1058115,1065600,1065729,1071995,1074701,1083548,1085030,1085235,1085308,1087078,1087082,1094912,1100394,1102640,1105412,1111666,1112178,1113956,1120163,1133021,1136666,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171558,1171688,1172073,1172108,1172247,1172418,1172428,1172871,1172872,1172873,1172963,1173060,1173485,1173798,1173954,1174003,1174026,1174070,1174161,1174205,1174387,1174484,1174547,1174549,1174550,1174625,1174658,1174685,1174689,1174699,1174734,1174757,1174771,1174840,1174841,1174843,1174844,1174845,1174852,1174873,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,1175666,117566 7,1175668,1175669,1175670,1175691,1175767,1175768,1175769,1175770,1175771,1175772,1175786,1175873,1176069 CVE References: CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-14386,CVE-2020-16166,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.37.1, kgraft-patch-SLE12-SP5_Update_9-1-8.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c27 --- Comment #27 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2574-1: An update that solves 7 vulnerabilities and has 131 fixes is now available. Category: security (important) Bug References: 1058115,1065600,1065729,1071995,1074701,1083548,1085030,1085235,1085308,1087078,1087082,1094912,1100394,1102640,1105412,1111666,1112178,1113956,1120163,1133021,1136666,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171558,1171688,1172073,1172108,1172247,1172418,1172428,1172871,1172872,1172873,1172963,1173060,1173485,1173798,1173954,1174003,1174026,1174070,1174161,1174205,1174387,1174484,1174547,1174549,1174550,1174625,1174658,1174685,1174689,1174699,1174734,1174757,1174771,1174840,1174841,1174843,1174844,1174845,1174852,1174873,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,1175666,117566 7,1175668,1175669,1175670,1175691,1175767,1175768,1175769,1175770,1175771,1175772,1175786,1175873,1176069 CVE References: CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-14386,CVE-2020-16166,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): kernel-default-4.12.14-122.37.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): kernel-docs-4.12.14-122.37.1, kernel-obs-build-4.12.14-122.37.1 SUSE Linux Enterprise Server 12-SP5 (src): kernel-default-4.12.14-122.37.1, kernel-source-4.12.14-122.37.1, kernel-syms-4.12.14-122.37.1 SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.37.1, kgraft-patch-SLE12-SP5_Update_9-1-8.5.1 SUSE Linux Enterprise High Availability 12-SP5 (src): kernel-default-4.12.14-122.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c28 --- Comment #28 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2575-1: An update that solves 8 vulnerabilities and has 121 fixes is now available. Category: security (important) Bug References: 1058115,1065600,1065729,1071995,1083548,1085030,1111666,1112178,1113956,1120163,1133021,1136666,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171558,1171688,1171988,1172073,1172108,1172247,1172418,1172428,1172871,1172872,1172873,1172963,1173060,1173485,1173798,1173954,1174003,1174026,1174070,1174205,1174387,1174484,1174547,1174549,1174550,1174625,1174658,1174685,1174689,1174699,1174734,1174757,1174771,1174840,1174841,1174843,1174844,1174845,1174852,1174873,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,1175666,1175667,1175668,1175669,1175670,1175691,1175767,1175768,1175769,1175770,117577 1,1175772,1175786,1175873,1176069 CVE References: CVE-2020-10135,CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-14386,CVE-2020-16166,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 15-SP1 (src): kernel-default-4.12.14-197.56.1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src): kernel-default-4.12.14-197.56.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): kernel-docs-4.12.14-197.56.1, kernel-obs-build-4.12.14-197.56.1, kernel-source-4.12.14-197.56.1, kernel-syms-4.12.14-197.56.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): kernel-default-4.12.14-197.56.1, kernel-source-4.12.14-197.56.1, kernel-zfcpdump-4.12.14-197.56.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.56.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c29 --- Comment #29 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2575-1: An update that solves 8 vulnerabilities and has 121 fixes is now available. Category: security (important) Bug References: 1058115,1065600,1065729,1071995,1083548,1085030,1111666,1112178,1113956,1120163,1133021,1136666,1144333,1152148,1163524,1165629,1166965,1169790,1170232,1171558,1171688,1171988,1172073,1172108,1172247,1172418,1172428,1172871,1172872,1172873,1172963,1173060,1173485,1173798,1173954,1174003,1174026,1174070,1174205,1174387,1174484,1174547,1174549,1174550,1174625,1174658,1174685,1174689,1174699,1174734,1174757,1174771,1174840,1174841,1174843,1174844,1174845,1174852,1174873,1174904,1174926,1174968,1175062,1175063,1175064,1175065,1175066,1175067,1175112,1175127,1175128,1175149,1175199,1175213,1175228,1175232,1175284,1175393,1175394,1175396,1175397,1175398,1175399,1175400,1175401,1175402,1175403,1175404,1175405,1175406,1175407,1175408,1175409,1175410,1175411,1175412,1175413,1175414,1175415,1175416,1175417,1175418,1175419,1175420,1175421,1175422,1175423,1175440,1175493,1175515,1175518,1175526,1175550,1175654,1175666,1175667,1175668,1175669,1175670,1175691,1175767,1175768,1175769,1175770,117577 1,1175772,1175786,1175873,1176069 CVE References: CVE-2020-10135,CVE-2020-14314,CVE-2020-14331,CVE-2020-14356,CVE-2020-14386,CVE-2020-16166,CVE-2020-1749,CVE-2020-24394 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 15-SP1 (src): kernel-default-4.12.14-197.56.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.56.1, kernel-livepatch-SLE15-SP1_Update_15-1-3.3.2 SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src): kernel-default-4.12.14-197.56.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): kernel-docs-4.12.14-197.56.1, kernel-obs-build-4.12.14-197.56.1, kernel-source-4.12.14-197.56.1, kernel-syms-4.12.14-197.56.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): kernel-default-4.12.14-197.56.1, kernel-source-4.12.14-197.56.1, kernel-zfcpdump-4.12.14-197.56.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.56.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c30 --- Comment #30 from OBSbugzilla Bot <bwiedemann+obsbugzillabot@suse.com> --- This is an autogenerated message for OBS integration: This bug (1166965) was mentioned in https://build.opensuse.org/request/show/834664 15.2 / python-Sphinx -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c33 --- Comment #33 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-RU-2020:1691-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1082318,1141993,1166965,1171573,1172650 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): python-amqp-2.6.1-lp152.2.3.1, python-billiard-3.6.3.0-lp152.3.5.1, python-django-allauth-0.42.0-lp152.2.3.1, python-django-filter-2.3.0-lp152.2.3.1, python-jaraco.text-3.2.0-lp152.2.1, python-kombu-4.6.11-lp152.2.3.1, python-moto-1.3.14-lp152.2.1, python-pycairo-1.19.1-lp152.2.1, python-python-redis-lock-3.6.0-lp152.2.1, python-rq-1.4.3-lp152.2.1, python-sentry-sdk-0.14.4-lp152.2.1, python-social-auth-app-django-4.0.0-lp152.5.3.1, python-sphinx-jsonschema-1.15-lp152.2.1, python-sshpubkeys-3.1.0-lp152.2.1, python-toml-0.10.1-lp152.3.3.1, python-toml-test-0.10.1-lp152.3.3.6, python-translation-finder-2.1-lp152.2.3.1, python-weblate-schemas-0.4-lp152.2.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c34 --- Comment #34 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:2999-1: An update that solves 15 vulnerabilities and has 84 fixes is now available. Category: security (important) Bug References: 1055186,1058115,1065600,1065729,1094244,1112178,1113956,1136666,1152148,1154366,1163524,1165629,1166965,1167527,1168468,1169790,1169972,1170232,1171558,1171675,1171688,1171742,1172073,1172538,1172873,1173060,1173115,1174003,1174354,1174899,1175228,1175515,1175520,1175528,1175667,1175691,1175716,1175749,1175873,1175882,1176011,1176022,1176038,1176069,1176235,1176242,1176278,1176316,1176317,1176318,1176319,1176320,1176321,1176381,1176395,1176410,1176423,1176482,1176507,1176536,1176544,1176545,1176546,1176548,1176659,1176698,1176699,1176700,1176721,1176722,1176725,1176732,1176788,1176789,1176869,1176877,1176935,1176946,1176950,1176962,1176966,1176990,1177027,1177030,1177041,1177042,1177043,1177044,1177121,1177206,1177258,1177291,1177293,1177294,1177295,1177296,1177340,1177511,802154 CVE References: CVE-2020-0404,CVE-2020-0427,CVE-2020-0431,CVE-2020-0432,CVE-2020-14381,CVE-2020-14386,CVE-2020-14390,CVE-2020-1749,CVE-2020-2521,CVE-2020-25212,CVE-2020-25284,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-26088 JIRA References: Sources used: SUSE Linux Enterprise Real Time Extension 12-SP5 (src): kernel-rt-4.12.14-10.19.1, kernel-rt_debug-4.12.14-10.19.1, kernel-source-rt-4.12.14-10.19.1, kernel-syms-rt-4.12.14-10.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c35 Steve Kowalik <steven.kowalik@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|IN_PROGRESS |RESOLVED Resolution|--- |FIXED --- Comment #35 from Steve Kowalik <steven.kowalik@suse.com> --- With python-Sphinx2 still in Factory being 2.3.1, I think we can close this. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c36 --- Comment #36 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:3014-1: An update that solves 14 vulnerabilities and has 78 fixes is now available. Category: security (important) Bug References: 1055186,1058115,1065600,1065729,1094244,1112178,1113956,1136666,1140683,1152148,1154366,1163524,1165629,1166965,1167527,1169972,1170232,1171558,1171688,1171742,1172073,1172538,1172873,1173060,1173115,1174748,1174899,1175228,1175520,1175667,1175691,1175749,1175882,1176011,1176022,1176038,1176069,1176235,1176242,1176278,1176316,1176317,1176318,1176319,1176320,1176321,1176381,1176395,1176400,1176410,1176423,1176482,1176507,1176536,1176544,1176545,1176546,1176548,1176659,1176698,1176699,1176700,1176721,1176722,1176725,1176732,1176788,1176789,1176869,1176877,1176935,1176946,1176950,1176962,1176966,1176990,1177027,1177030,1177041,1177042,1177043,1177044,1177121,1177206,1177258,1177291,1177293,1177294,1177295,1177296,1177340,1177511 CVE References: CVE-2020-0404,CVE-2020-0427,CVE-2020-0431,CVE-2020-0432,CVE-2020-14381,CVE-2020-14386,CVE-2020-14390,CVE-2020-1749,CVE-2020-25212,CVE-2020-25284,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-26088 JIRA References: Sources used: SUSE Linux Enterprise Module for Realtime 15-SP1 (src): kernel-rt-4.12.14-14.36.1, kernel-rt_debug-4.12.14-14.36.1, kernel-source-rt-4.12.14-14.36.1, kernel-syms-rt-4.12.14-14.36.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c39 --- Comment #39 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:3532-1: An update that solves 26 vulnerabilities and has 32 fixes is now available. Category: security (important) Bug References: 1051510,1058115,1065600,1131277,1160947,1161360,1163524,1166965,1170232,1170415,1171417,1172073,1172366,1173115,1173233,1175306,1175721,1175749,1175882,1176011,1176235,1176278,1176381,1176423,1176482,1176485,1176698,1176721,1176722,1176723,1176725,1176732,1176877,1176907,1176922,1176990,1177027,1177086,1177121,1177165,1177206,1177226,1177410,1177411,1177470,1177511,1177513,1177724,1177725,1177766,1178003,1178123,1178330,1178393,1178622,1178765,1178782,1178838 CVE References: CVE-2020-0404,CVE-2020-0427,CVE-2020-0430,CVE-2020-0431,CVE-2020-0432,CVE-2020-12351,CVE-2020-12352,CVE-2020-14351,CVE-2020-14381,CVE-2020-14390,CVE-2020-16120,CVE-2020-2521,CVE-2020-25212,CVE-2020-25284,CVE-2020-25285,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-25656,CVE-2020-25668,CVE-2020-25704,CVE-2020-25705,CVE-2020-26088,CVE-2020-27673,CVE-2020-27675,CVE-2020-8694 JIRA References: Sources used: SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.63.1, kernel-livepatch-SLE15_Update_21-1-1.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c40 --- Comment #40 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:3532-1: An update that solves 26 vulnerabilities and has 32 fixes is now available. Category: security (important) Bug References: 1051510,1058115,1065600,1131277,1160947,1161360,1163524,1166965,1170232,1170415,1171417,1172073,1172366,1173115,1173233,1175306,1175721,1175749,1175882,1176011,1176235,1176278,1176381,1176423,1176482,1176485,1176698,1176721,1176722,1176723,1176725,1176732,1176877,1176907,1176922,1176990,1177027,1177086,1177121,1177165,1177206,1177226,1177410,1177411,1177470,1177511,1177513,1177724,1177725,1177766,1178003,1178123,1178330,1178393,1178622,1178765,1178782,1178838 CVE References: CVE-2020-0404,CVE-2020-0427,CVE-2020-0430,CVE-2020-0431,CVE-2020-0432,CVE-2020-12351,CVE-2020-12352,CVE-2020-14351,CVE-2020-14381,CVE-2020-14390,CVE-2020-16120,CVE-2020-2521,CVE-2020-25212,CVE-2020-25284,CVE-2020-25285,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-25656,CVE-2020-25668,CVE-2020-25704,CVE-2020-25705,CVE-2020-26088,CVE-2020-27673,CVE-2020-27675,CVE-2020-8694 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15 (src): kernel-default-4.12.14-150.63.1, kernel-docs-4.12.14-150.63.1, kernel-obs-build-4.12.14-150.63.1, kernel-source-4.12.14-150.63.1, kernel-syms-4.12.14-150.63.1, kernel-vanilla-4.12.14-150.63.1 SUSE Linux Enterprise Server 15-LTSS (src): kernel-default-4.12.14-150.63.1, kernel-docs-4.12.14-150.63.1, kernel-obs-build-4.12.14-150.63.1, kernel-source-4.12.14-150.63.1, kernel-syms-4.12.14-150.63.1, kernel-vanilla-4.12.14-150.63.1, kernel-zfcpdump-4.12.14-150.63.1 SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.63.1, kernel-livepatch-SLE15_Update_21-1-1.5.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): kernel-default-4.12.14-150.63.1, kernel-docs-4.12.14-150.63.1, kernel-obs-build-4.12.14-150.63.1, kernel-source-4.12.14-150.63.1, kernel-syms-4.12.14-150.63.1, kernel-vanilla-4.12.14-150.63.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): kernel-default-4.12.14-150.63.1, kernel-docs-4.12.14-150.63.1, kernel-obs-build-4.12.14-150.63.1, kernel-source-4.12.14-150.63.1, kernel-syms-4.12.14-150.63.1, kernel-vanilla-4.12.14-150.63.1 SUSE Linux Enterprise High Availability 15 (src): kernel-default-4.12.14-150.63.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c41 --- Comment #41 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:3544-1: An update that solves 26 vulnerabilities and has 34 fixes is now available. Category: security (important) Bug References: 1051510,1058115,1065600,1131277,1160947,1163524,1166965,1168468,1170139,1170232,1170415,1171417,1171675,1172073,1172366,1173115,1173233,1175228,1175306,1175721,1175882,1176011,1176235,1176278,1176381,1176423,1176482,1176485,1176698,1176721,1176722,1176723,1176725,1176732,1176869,1176907,1176922,1176935,1176950,1176990,1177027,1177086,1177121,1177206,1177340,1177410,1177411,1177470,1177511,1177724,1177725,1177766,1177816,1178123,1178330,1178393,1178669,1178765,1178782,1178838 CVE References: CVE-2020-0404,CVE-2020-0427,CVE-2020-0430,CVE-2020-0431,CVE-2020-0432,CVE-2020-12351,CVE-2020-12352,CVE-2020-14351,CVE-2020-14381,CVE-2020-14390,CVE-2020-16120,CVE-2020-2521,CVE-2020-25212,CVE-2020-25284,CVE-2020-25285,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-25656,CVE-2020-25668,CVE-2020-25704,CVE-2020-25705,CVE-2020-26088,CVE-2020-27673,CVE-2020-27675,CVE-2020-8694 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE OpenStack Cloud 9 (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.65.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c42 --- Comment #42 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:3544-1: An update that solves 26 vulnerabilities and has 34 fixes is now available. Category: security (important) Bug References: 1051510,1058115,1065600,1131277,1160947,1163524,1166965,1168468,1170139,1170232,1170415,1171417,1171675,1172073,1172366,1173115,1173233,1175228,1175306,1175721,1175882,1176011,1176235,1176278,1176381,1176423,1176482,1176485,1176698,1176721,1176722,1176723,1176725,1176732,1176869,1176907,1176922,1176935,1176950,1176990,1177027,1177086,1177121,1177206,1177340,1177410,1177411,1177470,1177511,1177724,1177725,1177766,1177816,1178123,1178330,1178393,1178669,1178765,1178782,1178838 CVE References: CVE-2020-0404,CVE-2020-0427,CVE-2020-0430,CVE-2020-0431,CVE-2020-0432,CVE-2020-12351,CVE-2020-12352,CVE-2020-14351,CVE-2020-14381,CVE-2020-14390,CVE-2020-16120,CVE-2020-2521,CVE-2020-25212,CVE-2020-25284,CVE-2020-25285,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-25656,CVE-2020-25668,CVE-2020-25704,CVE-2020-25705,CVE-2020-26088,CVE-2020-27673,CVE-2020-27675,CVE-2020-8694 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE OpenStack Cloud 9 (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): kernel-default-4.12.14-95.65.1, kernel-source-4.12.14-95.65.1, kernel-syms-4.12.14-95.65.1 SUSE Linux Enterprise Live Patching 12-SP4 (src): kernel-default-4.12.14-95.65.1, kgraft-patch-SLE12-SP4_Update_17-1-6.5.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.65.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c44 --- Comment #44 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:0242-1: An update that solves 79 vulnerabilities and has 676 fixes is now available. Category: security (moderate) Bug References: 1034995,1040855,1043347,1044120,1044767,1055014,1055117,1055186,1058115,1061843,1065600,1065729,1066382,1071995,1077428,1085030,1094244,1094840,1109695,1115431,1120163,1129923,1133021,1134760,1136666,1138374,1139944,1148868,1149032,1152148,1152457,1152472,1152489,1153274,1154353,1154488,1154492,1154824,1155518,1155798,1156315,1156395,1157169,1158050,1158242,1158265,1158748,1158765,1158775,1158983,1159058,1159781,1159867,1159886,1160388,1160634,1160947,1161099,1161495,1162002,1162063,1162209,1162400,1162702,1163592,1163727,1164648,1164777,1164780,1165211,1165455,1165629,1165692,1165933,1165975,1166146,1166166,1166340,1166965,1166985,1167030,1167104,1167527,1167651,1167657,1167773,1167851,1168230,1168461,1168468,1168779,1168838,1168952,1168959,1169021,1169094,1169194,1169263,1169514,1169681,1169763,1169771,1169790,1169795,1170011,1170139,1170232,1170284,1170415,1170442,1170617,1170621,1170774,1170879,1170891,1170895,1171000,1171068,1171073,1171078,1171117,1171150,1171156,1171189,117119 1,1171218,1171219,1171220,1171236,1171242,1171246,1171285,1171293,1171374,1171390,1171391,1171392,1171417,1171426,1171507,1171513,1171514,1171529,1171530,1171558,1171634,1171644,1171662,1171675,1171688,1171699,1171709,1171730,1171732,1171736,1171739,1171742,1171743,1171759,1171773,1171774,1171775,1171776,1171777,1171778,1171779,1171780,1171781,1171782,1171783,1171784,1171785,1171786,1171787,1171788,1171789,1171790,1171791,1171792,1171793,1171794,1171795,1171796,1171797,1171798,1171799,1171810,1171827,1171828,1171832,1171833,1171834,1171835,1171839,1171840,1171841,1171842,1171843,1171844,1171849,1171857,1171868,1171904,1171915,1171982,1171983,1171988,1172017,1172046,1172061,1172062,1172063,1172064,1172065,1172066,1172067,1172068,1172069,1172073,1172086,1172095,1172108,1172145,1172169,1172170,1172197,1172201,1172208,1172223,1172247,1172317,1172342,1172343,1172344,1172365,1172366,1172374,1172391,1172393,1172394,1172418,1172419,1172453,1172458,1172467,1172484,1172537,1172543,1172687,117 2719,1172733,1172739,1172751,1172757,1172759,1172775,1172781,1172782,1172783,1172814,1172823,1172841,1172871,1172873,1172938,1172939,1172940,1172956,1172963,1172983,1172984,1172985,1172986,1172987,1172988,1172989,1172990,1172999,1173017,1173068,1173074,1173085,1173115,1173139,1173206,1173267,1173271,1173280,1173284,1173428,1173438,1173461,1173468,1173485,1173514,1173552,1173573,1173625,1173746,1173776,1173798,1173813,1173817,1173818,1173820,1173822,1173823,1173824,1173825,1173826,1173827,1173828,1173830,1173831,1173832,1173833,1173834,1173836,1173837,1173838,1173839,1173841,1173843,1173844,1173845,1173847,1173849,1173860,1173894,1173941,1173954,1174002,1174003,1174018,1174026,1174029,1174072,1174098,1174110,1174111,1174116,1174126,1174127,1174128,1174129,1174146,1174185,1174205,1174244,1174263,1174264,1174331,1174332,1174333,1174345,1174356,1174358,1174362,1174387,1174396,1174398,1174407,1174409,1174411,1174438,1174462,1174484,1174486,1174513,1174527,1174625,1174627,1174645,1174689, 1174699,1174737,1174748,1174757,1174762,1174770,1174771,1174777,1174805,1174824,1174825,1174852,1174865,1174880,1174897,1174899,1174906,1174969,1175009,1175010,1175011,1175012,1175013,1175014,1175015,1175016,1175017,1175018,1175019,1175020,1175021,1175052,1175079,1175112,1175116,1175128,1175149,1175175,1175176,1175180,1175181,1175182,1175183,1175184,1175185,1175186,1175187,1175188,1175189,1175190,1175191,1175192,1175195,1175199,1175213,1175232,1175263,1175284,1175296,1175306,1175344,1175345,1175346,1175347,1175367,1175377,1175440,1175480,1175493,1175546,1175550,1175599,1175621,1175654,1175667,1175691,1175718,1175721,1175749,1175768,1175769,1175770,1175771,1175772,1175774,1175775,1175787,1175807,1175834,1175873,1175882,1175898,1175918,1175952,1175995,1175996,1175997,1175998,1175999,1176000,1176001,1176019,1176022,1176038,1176063,1176069,1176109,1176137,1176180,1176200,1176235,1176236,1176237,1176242,1176354,1176357,1176358,1176359,1176360,1176361,1176362,1176363,1176364,1176365,11763 66,1176367,1176381,1176396,1176400,1176423,1176449,1176481,1176485,1176486,1176507,1176536,1176537,1176538,1176539,1176540,1176541,1176542,1176543,1176544,1176545,1176546,1176548,1176558,1176559,1176564,1176586,1176587,1176588,1176659,1176698,1176699,1176700,1176713,1176721,1176722,1176725,1176732,1176763,1176775,1176788,1176789,1176833,1176855,1176869,1176877,1176907,1176925,1176942,1176956,1176962,1176979,1176980,1176983,1176990,1177021,1177030,1177066,1177070,1177086,1177090,1177109,1177121,1177193,1177194,1177206,1177258,1177271,1177281,1177283,1177284,1177285,1177286,1177297,1177326,1177353,1177384,1177397,1177410,1177411,1177470,1177500,1177511,1177617,1177666,1177679,1177681,1177683,1177687,1177694,1177697,1177698,1177703,1177719,1177724,1177725,1177726,1177733,1177739,1177749,1177750,1177754,1177755,1177765,1177766,1177799,1177801,1177814,1177817,1177820,1177854,1177855,1177856,1177861,1178002,1178049,1178079,1178123,1178166,1178173,1178175,1178176,1178177,1178182,1178183,11 78184,1178185,1178186,1178190,1178191,1178203,1178227,1178246,1178255,1178270,1178286,1178307,1178330,1178393,1178395,1178401,1178426,1178461,1178579,1178581,1178584,1178585,1178589,1178590,1178612,1178634,1178635,1178653,1178659,1178660,1178661,1178669,1178686,1178740,1178755,1178756,1178762,1178780,1178838,1178853,1178886,1179001,1179012,1179014,1179015,1179045,1179076,1179082,1179107,1179140,1179141,1179160,1179201,1179204,1179211,1179217,1179419,1179424,1179425,1179426,1179427,1179429,1179432,1179434,1179435,1179442,1179519,1179550,1179575,1179578,1179601,1179604,1179639,1179652,1179656,1179670,1179671,1179672,1179673,1179675,1179676,1179677,1179678,1179679,1179680,1179681,1179682,1179683,1179684,1179685,1179687,1179688,1179689,1179690,1179703,1179704,1179707,1179709,1179710,1179711,1179712,1179713,1179714,1179715,1179716,1179745,1179763,1179887,1179888,1179892,1179896,1179960,1179963,1180027,1180029,1180031,1180052,1180056,1180086,1180117,1180258,1180261,1180349,1180506,1180541 ,1180559,1180566,173030,744692,789311,954532,995541 CVE References: CVE-2019-19462,CVE-2019-20810,CVE-2019-20812,CVE-2020-0110,CVE-2020-0305,CVE-2020-0404,CVE-2020-0427,CVE-2020-0431,CVE-2020-0432,CVE-2020-0444,CVE-2020-0465,CVE-2020-0466,CVE-2020-0543,CVE-2020-10135,CVE-2020-10711,CVE-2020-10732,CVE-2020-10751,CVE-2020-10757,CVE-2020-10766,CVE-2020-10767,CVE-2020-10768,CVE-2020-10773,CVE-2020-10781,CVE-2020-11668,CVE-2020-12351,CVE-2020-12352,CVE-2020-12652,CVE-2020-12656,CVE-2020-12769,CVE-2020-12771,CVE-2020-12888,CVE-2020-13143,CVE-2020-13974,CVE-2020-14314,CVE-2020-14331,CVE-2020-14351,CVE-2020-14356,CVE-2020-14385,CVE-2020-14386,CVE-2020-14390,CVE-2020-14416,CVE-2020-15393,CVE-2020-15436,CVE-2020-15437,CVE-2020-15780,CVE-2020-16120,CVE-2020-16166,CVE-2020-1749,CVE-2020-24490,CVE-2020-2521,CVE-2020-25212,CVE-2020-25284,CVE-2020-25285,CVE-2020-25641,CVE-2020-25643,CVE-2020-25645,CVE-2020-25656,CVE-2020-25668,CVE-2020-25669,CVE-2020-25704,CVE-2020-25705,CVE-2020-26088,CVE-2020-27068,CVE-2020-27777,CVE-2020-27786,CVE-2020-27825,CVE-2020-27830,CVE-2 020-28915,CVE-2020-28941,CVE-2020-28974,CVE-2020-29369,CVE-2020-29370,CVE-2020-29371,CVE-2020-29373,CVE-2020-29660,CVE-2020-29661,CVE-2020-36158,CVE-2020-4788,CVE-2020-8694 JIRA References: Sources used: openSUSE Leap 15.2 (src): kernel-rt-5.3.18-lp152.3.5.1, kernel-rt_debug-5.3.18-lp152.3.5.1, kernel-source-rt-5.3.18-lp152.3.5.1, kernel-syms-rt-5.3.18-lp152.3.5.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c56 --- Comment #56 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2022:0685-1: An update that has two recommended fixes and contains one feature can now be installed. Category: recommended (important) Bug References: 1166965,1193712 CVE References: JIRA References: SLE-22137 Sources used: SUSE Linux Enterprise Module for HPC 15-SP3 (src): clingo-5.5.0-150300.7.4.1, spack-0.17.1-150300.5.8.2, spack-0.17.1-150300.5.8.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1166965 https://bugzilla.suse.com/show_bug.cgi?id=1166965#c57 --- Comment #57 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-RU-2022:0685-1: An update that has two recommended fixes and contains one feature can now be installed. Category: recommended (important) Bug References: 1166965,1193712 CVE References: JIRA References: SLE-22137 Sources used: openSUSE Leap 15.3 (src): spack-0.17.1-150300.5.8.2, spack-0.17.1-150300.5.8.3 -- You are receiving this mail because: You are on the CC list for the bug.
participants (2)
-
bugzilla_noreply@novell.com
-
bugzilla_noreply@suse.com