[Bug 1135854] New: Compressing kernel modules (turn on MODULE_COMPRESS_XZ)?
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Bug ID: 1135854 Summary: Compressing kernel modules (turn on MODULE_COMPRESS_XZ)? Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-maintainers@forge.provo.novell.com Reporter: jslaby@suse.com QA Contact: qa-bugs@suse.de CC: mkubecek@suse.com, tiwai@suse.com Found By: --- Blocker: --- I'm in favor of enabling module compression in master & stable branches. =============== init/Kconfig =============== config MODULE_COMPRESS bool "Compress modules on installation" depends on MODULES help Compresses kernel modules when 'make modules_install' is run; gzip or xz depending on "Compression algorithm" below. module-init-tools MAY support gzip, and kmod MAY support gzip and xz. Out-of-tree kernel modules installed using Kbuild will also be compressed upon installation. Note: for modules inside an initrd or initramfs, it's more efficient to compress the whole initrd or initramfs instead. Note: This is fully compatible with signed modules. If in doubt, say N. =============== EOF =============== In particular I would go for config MODULE_COMPRESS_XZ. It saves a lot of space: - Size : 364828674 + Size : 143548638 Surprisingly, it makes the system startup faster (systemd-analyze output of 2x3 boots): compressed ========== Startup finished in 2.059s (kernel) + 9.492s (initrd) + 7.496s (userspace) = 19.049s multi-user.target reached after 7.482s in userspace Startup finished in 2.117s (kernel) + 9.977s (initrd) + 7.483s (userspace) = 19.578s multi-user.target reached after 7.469s in userspace Startup finished in 2.113s (kernel) + 10.356s (initrd) + 7.733s (userspace) = 20.203s multi-user.target reached after 7.719s in userspace non-compressed ============== Startup finished in 3.848s (kernel) + 9.932s (initrd) + 8.446s (userspace) = 22.227s multi-user.target reached after 8.422s in userspace Startup finished in 3.910s (kernel) + 10.519s (initrd) + 8.155s (userspace) = 22.584s multi-user.target reached after 8.130s in userspace Startup finished in 3.901s (kernel) + 8.572s (initrd) + 8.801s (userspace) = 21.275s multi-user.target reached after 8.766s in userspace ============================================ Note that the modules are stored untouched (i.e. compressed individually) in initrd by dracut now. This should be perhaps changed: Size of initrd with *.ko.xz in initrd: 10758844 Size of initrd with *.ko in initrd: 10611448 *.ko in initrd and *.ko.xz on disk ================================== Startup finished in 2.056s (kernel) + 9.665s (initrd) + 7.322s (userspace) = 19.044s multi-user.target reached after 7.298s in userspace Startup finished in 2.037s (kernel) + 8.131s (initrd) + 7.307s (userspace) = 17.476s multi-user.target reached after 7.294s in userspace Startup finished in 2.051s (kernel) + 8.624s (initrd) + 7.408s (userspace) = 18.084s multi-user.target reached after 7.395s in userspace ============================================ This is what I did: --- /usr/lib/dracut/dracut-init.sh.old 2019-05-22 07:52:05.296000000 +0200 +++ /usr/lib/dracut/dracut-init.sh 2019-05-22 07:56:21.600000000 +0200 @@ -903,6 +903,10 @@ inst_simple "$1" "/lib/modules/$kernel/${1##*/lib/modules/$kernel/}" ret=$? + if [ "${1##*.ko}" = ".xz" ]; then + dinfo "unxz ${initdir}/lib/modules/$kernel/${1##*/lib/modules/$kernel/}" + unxz -f "${initdir}/lib/modules/$kernel/${1##*/lib/modules/$kernel/}" + fi [[ $DRACUT_KERNEL_LAZY_HASHDIR ]] && \ [[ -d "$DRACUT_KERNEL_LAZY_HASHDIR" ]] && \ echo $ret > "$DRACUT_KERNEL_LAZY_HASHDIR/${1##*/}" FWIW Fedora already compresses modules, but they do it in their .spec file, not by the kernel config option: =============== kernel.spec =============== %ifarch %{ix86} x86_64 %global signkernel 1 %global signmodules 1 %global zipmodules 1 %else %global signkernel 0 %global signmodules 1 %global zipmodules 1 %endif ... if [ "%{zipmodules}" -eq "1" ]; then \ find $RPM_BUILD_ROOT/lib/modules/ -type f -name '*.ko' | xargs xz; \ fi \ =============== EOF =============== I am not sure why as Makefiles seem to do the right job: =============== Makefile =============== # CONFIG_MODULE_COMPRESS, if defined, will cause module to be compressed # after they are installed in agreement with CONFIG_MODULE_COMPRESS_GZIP # or CONFIG_MODULE_COMPRESS_XZ. mod_compress_cmd = true ifdef CONFIG_MODULE_COMPRESS ifdef CONFIG_MODULE_COMPRESS_GZIP mod_compress_cmd = gzip -n -f endif # CONFIG_MODULE_COMPRESS_GZIP ifdef CONFIG_MODULE_COMPRESS_XZ mod_compress_cmd = xz -f endif # CONFIG_MODULE_COMPRESS_XZ endif # CONFIG_MODULE_COMPRESS export mod_compress_cmd =============== scripts/Makefile.modinst =============== quiet_cmd_modules_install = INSTALL $@ cmd_modules_install = \ mkdir -p $(2) ; \ cp $@ $(2) ; \ $(mod_strip_cmd) $(2)/$(notdir $@) ; \ $(mod_sign_cmd) $(2)/$(notdir $@) $(patsubst %,|| true,$(KBUILD_EXTMOD)) ; \ $(mod_compress_cmd) $(2)/$(notdir $@) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c1 --- Comment #1 from Takashi Iwai <tiwai@suse.com> --- Thanks for opening this bug entry. I looked at this scenario in the last week, too, and I'd love to have this enabled. In my experiment, I didn't change dracut to uncompress, but yes, that's more efficient, indeed. But, the debuginfo extraction doesn't seem working as is for *.ko.xz. This seems requiring to hack rpm itself. The hacked version is found in OBS home:tiwai:test:kernel-compress repo. And, what's still not checked is about our signing procedure. This needs more checks by other people... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Matthias Brugger <mbrugger@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mbrugger@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c2 --- Comment #2 from Takashi Iwai <tiwai@suse.com> --- I guess Fedora running xz manually in the spec because it needs to strip debuginfo before signing. Maybe we have to do that, too; i.e. compress in an extra step after pesign, instead of doing via CONFIG_MODULE_COMPRESS. But in our case it might be more tricky, because pesign is performed in the second run. If we run xz at that point, the file list itself will vary. BTW, my hacked version of rpm seems still somehow buggy... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c3 --- Comment #3 from Takashi Iwai <tiwai@suse.com> --- Now I played with pesign-obs-integration and this approach looks more promising. Below is a patch to pesign-obs-integration package. This enables the compression at the repackaging phase after signing, so we can avoid the compress/decompress pingpong. The package in OBS home:tiwai:test:compress2 contains the patched pesign-obs-integration and kernel packages, as well as the patched dracut. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c4 --- Comment #4 from Takashi Iwai <tiwai@suse.com> --- Created attachment 805865 --> http://bugzilla.suse.com/attachment.cgi?id=805865&action=edit Hack for pesign-obs-integration -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c5 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |glin@suse.com, | |msuchanek@suse.com --- Comment #5 from Takashi Iwai <tiwai@suse.com> --- Adding more people to Cc, including pesign-obs-integration package maintainer. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c6 --- Comment #6 from Gary Ching-Pang Lin <glin@suse.com> --- The patch looks good to me. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c7 --- Comment #7 from Takashi Iwai <tiwai@suse.com> --- Thanks for review! Maybe I'm going to change $BRP_PESIGN_COMPRESS to $BRP_PESIGN_MODULE_COMPRESS or such to avoid ambiguity before the final version. What else might be broken by moving to the compressed modules? Do kdump and crash work as is? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c8 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dmair@suse.com, | |ptesarik@suse.com Flags| |needinfo?(dmair@suse.com), | |needinfo?(ptesarik@suse.com | |) --- Comment #8 from Jiri Slaby <jslaby@suse.com> --- (In reply to Takashi Iwai from comment #7)
What else might be broken by moving to the compressed modules? Do kdump and crash work as is?
You are perhaps the ones knowing the answer to this. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c9 --- Comment #9 from Takashi Iwai <tiwai@suse.com> --- I noticed module-init-tools needs a fix for supporting the compressed modules in KMP. The fix is found in the same OBS repo, home:tiwai:test:compress2. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c10 --- Comment #10 from Michal Suchanek <msuchanek@suse.com> --- KMP dependencies will break. The rpm scripts don't handle different module names and decompression. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c11 --- Comment #11 from Takashi Iwai <tiwai@suse.com> --- (In reply to Michal Suchanek from comment #10)
KMP dependencies will break. The rpm scripts don't handle different module names and decompression.
A good point. Interestingly find-provides.ksyms already supports *.ko.gz but not *.ko.xz. fid-requires.ksysm and find-supplments.ksyms don't support the compression format at all. FWIW, now they were split into rpm-config-SUSE package. I'm going to hack them... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c12 --- Comment #12 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806081 --> http://bugzilla.suse.com/attachment.cgi?id=806081&action=edit Hack for module-init-tools -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c13 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #805865|0 |1 is obsolete| | --- Comment #13 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806082 --> http://bugzilla.suse.com/attachment.cgi?id=806082&action=edit Revised hack for pesign-obs-integration -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c14 --- Comment #14 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806083 --> http://bugzilla.suse.com/attachment.cgi?id=806083&action=edit Revised hack for dracut -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c15 --- Comment #15 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806084 --> http://bugzilla.suse.com/attachment.cgi?id=806084&action=edit Hack for rpm-config-SUSE -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c16 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #806081|0 |1 is obsolete| | --- Comment #16 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806089 --> http://bugzilla.suse.com/attachment.cgi?id=806089&action=edit Hack for module-init-tools (revised) I forgot to amend the changes in the previous patch. Refreshed. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c17 --- Comment #17 from Michal Suchanek <msuchanek@suse.com> --- Comment on attachment 806084 --> http://bugzilla.suse.com/attachment.cgi?id=806084 Hack for rpm-config-SUSE There are quite a few more places where the module names without compression suffix are hardcoded: driver-check.sh: exec 3< <(sed -rn 's:^(/lib/modules)?/([^/]*)/(.*\.ko)$:\1 \2 \3:p' \ driver-check.sh:modules=($(find /lib/modules/ -name '*.ko')) kmp-install: return unless $path =~ m@^/lib/modules/([^/]+)/.*/([^/]+\.ko)$@; kmp-install: next unless $file =~ m@^/lib/modules/.*/.*/.*\.ko$@; weak-modules: find /lib/modules/$module_krel/updates -name '*.ko' \ weak-modules: module=${module%.ko} weak-modules: for module in $(find /lib/modules/$krel/updates -name '*.ko'); do weak-modules2: sed -rn 's:.*\<lib/modules/.*/([^/]*\.ko)$:\1:p' weak-modules2: | grep -Ee '^/lib/modules/[^/]+/.+\.ko$' \ weak-modules2: local initrd_basenames=($( (lsinitrd /boot/initrd-$krel | filter_basenames; INITRD_MODULES=; . /etc/sysconfig/kernel &>/dev/null; printf '%s.ko\n' $INITRD_MODULES) | sort -u)) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c18 --- Comment #18 from Takashi Iwai <tiwai@suse.com> --- (In reply to Michal Suchanek from comment #17)
Comment on attachment 806084 [details] Hack for rpm-config-SUSE
There are quite a few more places where the module names without compression suffix are hardcoded:
driver-check.sh: exec 3< <(sed -rn 's:^(/lib/modules)?/([^/]*)/(.*\.ko)$:\1 \2 \3:p' \ driver-check.sh:modules=($(find /lib/modules/ -name '*.ko')) kmp-install: return unless $path =~ m@^/lib/modules/([^/]+)/.*/([^/]+\.ko)$@; kmp-install: next unless $file =~ m@^/lib/modules/.*/.*/.*\.ko$@; weak-modules: find /lib/modules/$module_krel/updates -name '*.ko' \ weak-modules: module=${module%.ko} weak-modules: for module in $(find /lib/modules/$krel/updates -name '*.ko'); do weak-modules2: sed -rn 's:.*\<lib/modules/.*/([^/]*\.ko)$:\1:p' weak-modules2: | grep -Ee '^/lib/modules/[^/]+/.+\.ko$' \ weak-modules2: local initrd_basenames=($( (lsinitrd /boot/initrd-$krel | filter_basenames; INITRD_MODULES=; . /etc/sysconfig/kernel &>/dev/null; printf '%s.ko\n' $INITRD_MODULES) | sort -u))
weak-modules is deprecated, so we don't need to care, I guess. I couldn't find driver-check.sh and kmp-install, though... Where are these? Through grep, I see that fileattrs/* need fixes. Will work on them... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c19 --- Comment #19 from Michal Suchanek <msuchanek@suse.com> --- (In reply to Takashi Iwai from comment #18)
weak-modules is deprecated, so we don't need to care, I guess.
Yes, that should work.
I couldn't find driver-check.sh and kmp-install, though... Where are these?
This is git grep output from the rpm-config-SUSE repository. I am not sure what (if anything) uses these scripts. I would expect they would not end up in this repository if nothing did but then old weak-modules would neither. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c20 --- Comment #20 from Takashi Iwai <tiwai@suse.com> --- (In reply to Michal Suchanek from comment #19)
(In reply to Takashi Iwai from comment #18)
I couldn't find driver-check.sh and kmp-install, though... Where are these?
This is git grep output from the rpm-config-SUSE repository. I am not sure what (if anything) uses these scripts. I would expect they would not end up in this repository if nothing did but then old weak-modules would neither.
Hm, I'm checking both TW package and https://github.com/openSUSE/rpm-config-SUSE but I couldn't find these. Which repository are you looking at? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c21 --- Comment #21 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806097 --> http://bugzilla.suse.com/attachment.cgi?id=806097&action=edit Hack for rpm-config-SUSE (revised) Including more fixes. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c22 --- Comment #22 from Takashi Iwai <tiwai@suse.com> --- Ah, now I see, it's suse-module-tools, not rpm-config-SUSE :) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c23 --- Comment #23 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806102 --> http://bugzilla.suse.com/attachment.cgi?id=806102&action=edit Hack for driver-check.sh -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c24 --- Comment #24 from Takashi Iwai <tiwai@suse.com> --- Created attachment 806103 --> http://bugzilla.suse.com/attachment.cgi?id=806103&action=edit Hack for kmp-install -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |martin.wilck@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c25 --- Comment #25 from Michal Suchanek <msuchanek@suse.com> --- Comment on attachment 806103 --> http://bugzilla.suse.com/attachment.cgi?id=806103 Hack for kmp-install LGTM -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c26 --- Comment #26 from Michal Suchanek <msuchanek@suse.com> --- Comment on attachment 806097 --> http://bugzilla.suse.com/attachment.cgi?id=806097 Hack for rpm-config-SUSE (revised) You have an old version.
--- a/scripts/find-provides.ksyms +++ b/scripts/find-provides.ksyms @@ -31,7 +31,7 @@ while read f; do version=${flavor} flavor=${flavor##*-} ;; - */lib/modules/*/*.ko | */lib/modules/*/*.ko.gz | */boot/vmlinu[xz]*) + */lib/modules/*/*.ko | */lib/modules/*/*.ko.gz | */lib/modules/*/*.ko.gz | */boot/vmlinu[xz]*)
I see: fi flavor=${flavor##*-} ;; */lib/modules/*/*.ko | */lib/modules/*/*.ko.gz) is_module="1" modname="${f%%.gz}" echo "kmod($(basename "$modname" | tr '-' '_'))" -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c27 --- Comment #27 from Takashi Iwai <tiwai@suse.com> --- (In reply to Michal Suchanek from comment #26)
Comment on attachment 806097 [details] Hack for rpm-config-SUSE (revised)
You have an old version.
--- a/scripts/find-provides.ksyms +++ b/scripts/find-provides.ksyms @@ -31,7 +31,7 @@ while read f; do version=${flavor} flavor=${flavor##*-} ;; - */lib/modules/*/*.ko | */lib/modules/*/*.ko.gz | */boot/vmlinu[xz]*) + */lib/modules/*/*.ko | */lib/modules/*/*.ko.gz | */lib/modules/*/*.ko.gz | */boot/vmlinu[xz]*)
I see: fi flavor=${flavor##*-} ;; */lib/modules/*/*.ko | */lib/modules/*/*.ko.gz) is_module="1" modname="${f%%.gz}" echo "kmod($(basename "$modname" | tr '-' '_'))"
Yeah, I patched to TW package that seems a bit outdated. Now I'm working on git repo... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c28 --- Comment #28 from Michal Suchanek <msuchanek@suse.com> --- Comment on attachment 806102 --> http://bugzilla.suse.com/attachment.cgi?id=806102 Hack for driver-check.sh LGTM -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c29 --- Comment #29 from Takashi Iwai <tiwai@suse.com> --- I've pushed my changes to github forks, https://github.com/tiwai/rpm-config-SUSE.git https://github.com/tiwai/suse-module-tools.git Will do PR once when we sort out things. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c30 --- Comment #30 from Gary Ching-Pang Lin <glin@suse.com> --- (In reply to Takashi Iwai from comment #13)
Created attachment 806082 [details] Revised hack for pesign-obs-integration
Looks good to me. BTW, the git repo of pesign-obs-integration is in github[*]. You can submit a PR if you like to. [*] https://github.com/openSUSE/pesign-obs-integration -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c31 --- Comment #31 from Takashi Iwai <tiwai@suse.com> --- (In reply to Gary Ching-Pang Lin from comment #30)
(In reply to Takashi Iwai from comment #13)
Created attachment 806082 [details] Revised hack for pesign-obs-integration
Looks good to me. BTW, the git repo of pesign-obs-integration is in github[*]. You can submit a PR if you like to.
Thanks. Now let's start from this one, then. I send a PR for pesign-obs-integration on github. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c32 --- Comment #32 from Takashi Iwai <tiwai@suse.com> --- Now pesign-obs-integration git repo got updated. Gary, care to submit a new package? Meanwhile, PR's for rpm-config-SUSE and suse-module-tools are on the way on github repos. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c33 --- Comment #33 from Gary Ching-Pang Lin <glin@suse.com> --- https://build.opensuse.org/request/show/706197 The pesign-obs-integration patch is accepted in openSUSE:Factory. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c34 --- Comment #34 from Takashi Iwai <tiwai@suse.com> --- (In reply to Gary Ching-Pang Lin from comment #33)
https://build.opensuse.org/request/show/706197 The pesign-obs-integration patch is accepted in openSUSE:Factory.
Thanks! The PR for rpm-config-SUSE was accepted in github, but no package update done yet. The PR for suse-module-tools is still pending: https://github.com/openSUSE/suse-module-tools/pull/8 And I sent a PR for dracut now: https://github.com/openSUSE/dracut/pull/11 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c35 --- Comment #35 from Swamp Workflow Management <swamp@suse.de> --- This is an autogenerated message for OBS integration: This bug (1135854) was mentioned in https://build.opensuse.org/request/show/710577 Factory / suse-module-tools -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(dmair@suse.com), | |needinfo?(ptesarik@suse.com | |) | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c36 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |daniel.molkentin@suse.com Flags| |needinfo?(daniel.molkentin@ | |suse.com) --- Comment #36 from Takashi Iwai <tiwai@suse.com> --- The fix for rpm-config-SUSE is on its way to FACTORY now. So the only missing piece is dracut. Daniel, how is the status? Once after dracut is fixed, we can proceed to the kernel package itself, finally. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c37 --- Comment #37 from Takashi Iwai <tiwai@suse.com> --- Daniel? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c42 --- Comment #42 from Takashi Iwai <tiwai@suse.com> --- BTW, Daniel, can we put the fix to SLE15 dracut package as well? Since many people are using the TW / Kernel:stable kernel on Leap 15.x system, they also need to deal with the compressed kernel modules once when we switch to it. In theory, the old dracut would still work with the compressed modules, it's better to have the proper fix. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c43 --- Comment #43 from Swamp Workflow Management <swamp@suse.de> --- This is an autogenerated message for OBS integration: This bug (1135854) was mentioned in https://build.opensuse.org/request/show/717099 Factory / dracut -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c44 --- Comment #44 from Takashi Iwai <tiwai@suse.com> --- Now I submitted the change in kernel side to master branch. The test kernel seemed working, found in OBS and IBS home:tiwai:test:kernel-compress2 repo, if anyone wants to take a look. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c45 --- Comment #45 from Takashi Iwai <tiwai@suse.com> --- Now merged into master branch. I confirmed that Leap 15.1 system works with the compressed modules as is. It's not ideal to include the compressed modules in initrd, though. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c47 --- Comment #47 from Jiri Slaby <jslaby@suse.com> --- There are two more packages needing support for compression: system:install:head/installation-images system:install:head/linuxrc The former is fixed in factory, the latter, I am fixing ATM. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c48 --- Comment #48 from Takashi Iwai <tiwai@suse.com> --- Great, thanks! -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c49 --- Comment #49 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #47)
system:install:head/linuxrc
https://github.com/openSUSE/linuxrc/pull/195 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c53 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #53 from Jiri Slaby <jslaby@suse.com> --- We are done for Tumbleweed, it seems. Everything seems to run smoothly, nobody complains. For other distributions, we can open new bugs, if desirable. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c54 --- Comment #54 from Swamp Workflow Management <swamp@suse.de> --- This is an autogenerated message for OBS integration: This bug (1135854) was mentioned in https://build.opensuse.org/request/show/742016 15.0 / kernel-source -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard| |ibs:running:12919:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c56 --- Comment #56 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2019:2392-1: An update that solves 5 vulnerabilities and has 98 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1086323,1087092,1089644,1093205,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1114279,1117665,1123080,1133140,1134303,1135642,1135854,1135873,1137799,1140729,1140845,1140883,1141600,1142635,1142667,1144375,1144449,1145099,1148410,1150452,1150465,1150875,1151508,1152788,1152791,1153112,1153158,1153236,1153263,1153646,1153713,1153717,1153718,1153719,1153811,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154747,118461_FIXME,133135_FIXME,135757_FIXME,147830_FIXME,147831_FIXME,158172_FIXME,165544_FIXME,166495_FIXME,172859_FIXME,172860_FIXME,181778_FIXME,229268_FIXME,229269_FIXME,229270_FIXME,229274_FIXME,229277_FIXME,229279_FIXME,229280_FIXME,229281_FIXME,229283_FIXME,229285_FIXME,229286_FIXME,229297_FIXME,296718_FIXME,358767_FIXME,359798_FIXME,802154,814594,919448,987367,998153 CVE References: CVE-2019-16232,CVE-2019-16234,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: openSUSE Leap 15.0 (src): kernel-debug-4.12.14-lp150.12.79.1, kernel-default-4.12.14-lp150.12.79.1, kernel-docs-4.12.14-lp150.12.79.1, kernel-kvmsmall-4.12.14-lp150.12.79.1, kernel-obs-build-4.12.14-lp150.12.79.1, kernel-obs-qa-4.12.14-lp150.12.79.1, kernel-source-4.12.14-lp150.12.79.1, kernel-syms-4.12.14-lp150.12.79.1, kernel-vanilla-4.12.14-lp150.12.79.1 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c57 --- Comment #57 from Swamp Workflow Management <swamp@suse.de> --- This is an autogenerated message for OBS integration: This bug (1135854) was mentioned in https://build.opensuse.org/request/show/744014 15.1 / kernel-source -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:12919:important |ibs:running:12919:important | |obs:running:11375:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:12919:important |obs:running:11375:important |obs:running:11375:important | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c58 --- Comment #58 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2879-1: An update that solves 9 vulnerabilities and has 112 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1054914,1055117,1055186,1061840,1064802,1065600,1065729,1066129,1071995,1073513,1082555,1086323,1087092,1089644,1093205,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1104967,1109158,1113722,1114279,1117665,1119086,1122363,1123034,1123080,1127155,1127988,1131304,1133140,1134303,1135642,1135854,1135873,1137799,1137861,1137865,1137959,1140155,1140729,1140845,1140883,1141600,1142076,1142635,1142667,1144375,1144449,1145099,1146042,1146519,1146540,1146664,1148133,1148410,1148712,1148868,1149313,1149446,1149555,1149651,1150381,1150423,1150452,1150465,1150875,1151350,1151508,1151610,1151667,1151671,1151680,1151891,1151955,1152024,1152025,1152026,1152161,1152325,1152457,1152460,1152466,1152788,1152791,1152972,1152974,1152975,1153112,1153158,1153236,1153263,1153646,1153713,1153717,1153718,1153719,1153811,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154747 CVE References: CVE-2017-18595,CVE-2019-14821,CVE-2019-15291,CVE-2019-16232,CVE-2019-16234,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-9506 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.37.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.37.1, kernel-obs-build-4.12.14-95.37.1 SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.37.1, kernel-source-4.12.14-95.37.1, kernel-syms-4.12.14-95.37.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.37.1 SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.37.1, kernel-source-4.12.14-95.37.1, kernel-syms-4.12.14-95.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c59 --- Comment #59 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2879-1: An update that solves 9 vulnerabilities and has 112 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1054914,1055117,1055186,1061840,1064802,1065600,1065729,1066129,1071995,1073513,1082555,1086323,1087092,1089644,1093205,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1104967,1109158,1113722,1114279,1117665,1119086,1122363,1123034,1123080,1127155,1127988,1131304,1133140,1134303,1135642,1135854,1135873,1137799,1137861,1137865,1137959,1140155,1140729,1140845,1140883,1141600,1142076,1142635,1142667,1144375,1144449,1145099,1146042,1146519,1146540,1146664,1148133,1148410,1148712,1148868,1149313,1149446,1149555,1149651,1150381,1150423,1150452,1150465,1150875,1151350,1151508,1151610,1151667,1151671,1151680,1151891,1151955,1152024,1152025,1152026,1152161,1152325,1152457,1152460,1152466,1152788,1152791,1152972,1152974,1152975,1153112,1153158,1153236,1153263,1153646,1153713,1153717,1153718,1153719,1153811,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154747 CVE References: CVE-2017-18595,CVE-2019-14821,CVE-2019-15291,CVE-2019-16232,CVE-2019-16234,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-9506 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.37.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.37.1, kernel-obs-build-4.12.14-95.37.1 SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.37.1, kernel-source-4.12.14-95.37.1, kernel-syms-4.12.14-95.37.1 SUSE Linux Enterprise Live Patching 12-SP4 (src): kgraft-patch-SLE12-SP4_Update_9-1-6.5.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.37.1 SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.37.1, kernel-source-4.12.14-95.37.1, kernel-syms-4.12.14-95.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c61 --- Comment #61 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2019:2444-1: An update that solves 7 vulnerabilities and has 96 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1093205,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1111666,1112178,1113994,1114279,1117665,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1137040,1137799,1137861,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1145099,1146612,1148410,1149853,1150452,1150457,1150465,1150875,1151508,1151807,1152033,1152624,1152685,1152788,1152790,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153607,1153646,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154242,1154268,1154354,1154372,1154521,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1155178,1155179,1155184,1155186 CVE References: CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: openSUSE Leap 15.1 (src): kernel-debug-4.12.14-lp151.28.25.1, kernel-default-4.12.14-lp151.28.25.1, kernel-docs-4.12.14-lp151.28.25.1, kernel-kvmsmall-4.12.14-lp151.28.25.1, kernel-obs-build-4.12.14-lp151.28.25.1, kernel-obs-qa-4.12.14-lp151.28.25.1, kernel-source-4.12.14-lp151.28.25.1, kernel-syms-4.12.14-lp151.28.25.1, kernel-vanilla-4.12.14-lp151.28.25.1 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|obs:running:11375:important |obs:running:11375:important | |ibs:running:13110:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|obs:running:11375:important |ibs:running:13110:important |ibs:running:13110:important | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13110:important |ibs:running:13110:important | |ibs:running:13116:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13110:important |ibs:running:13110:important |ibs:running:13116:important |ibs:running:13116:important | |ibs:running:13157:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13110:important |ibs:running:13110:important |ibs:running:13116:important |ibs:running:13116:important |ibs:running:13157:important |ibs:running:13157:important | |ibs:running:13158:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13110:important |ibs:running:13110:important |ibs:running:13116:important |ibs:running:13116:important |ibs:running:13157:important |ibs:running:13157:important |ibs:running:13158:important |ibs:running:13158:important | |ibs:running:13159:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c65 --- Comment #65 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2952-1: An update that solves 10 vulnerabilities and has 111 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1111666,1112178,1113994,1114279,1117665,1119461,1119465,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1135967,1137040,1137799,1137861,1138190,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1149853,1150452,1150457,1150465,1150875,1151508,1151807,1152033,1152624,1152665,1152685,1152696,1152697,1152788,1152790,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153607,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154242,1154268,1154354,1154372,1154521,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1155061,1155178,1155179,1155184,1155186,1155671 CVE References: CVE-2018-12207,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src): kernel-azure-4.12.14-8.19.1, kernel-source-azure-4.12.14-8.19.1, kernel-syms-azure-4.12.14-8.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13110:important | |ibs:running:13116:important | |ibs:running:13157:important | |ibs:running:13158:important | |ibs:running:13159:important | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c66 --- Comment #66 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2946-1: An update that solves 12 vulnerabilities and has 93 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1114279,1117665,1119461,1119465,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1135966,1135967,1137040,1137799,1138190,1139073,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1150452,1150457,1150465,1150875,1151508,1152624,1152685,1152788,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153646,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1155178,1155179,1155184,1155186,1155671 CVE References: CVE-2018-12207,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.41.1, kernel-livepatch-SLE15_Update_16-1-1.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c67 --- Comment #67 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2953-1: An update that solves 12 vulnerabilities and has 115 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1114279,1117665,1119461,1119465,1122363,1123034,1123080,1127155,1133140,1134303,1135642,1135854,1135873,1135967,1137040,1137799,1137861,1138190,1139073,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1150452,1150457,1150465,1150875,1151225,1151508,1151680,1152497,1152505,1152506,1152624,1152685,1152782,1152788,1152791,1153108,1153112,1153158,1153236,1153263,1153476,1153509,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1154959,1155178,1155179,1155184,1155186,1155671,1155692,1155812,1155817,1155836,1155945,1155982,1156187,919448 ,987367,998153 CVE References: CVE-2018-12207,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-18805 Sources used: SUSE Linux Enterprise Server 12-SP4 (src): kernel-azure-4.12.14-6.29.1, kernel-source-azure-4.12.14-6.29.1, kernel-syms-azure-4.12.14-6.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c68 --- Comment #68 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2947-1: An update that solves 10 vulnerabilities and has 117 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1111666,1112178,1113994,1114279,1117665,1119461,1119465,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1135967,1137040,1137799,1137861,1138190,1139073,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1149853,1150452,1150457,1150465,1150875,1151508,1151807,1152033,1152624,1152665,1152685,1152696,1152697,1152788,1152790,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153607,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154242,1154268,1154354,1154372,1154521,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1155061,1155178,1155179,1155184,1155186,1155671,802154,814594,919448,9 87367,998153 CVE References: CVE-2018-12207,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.26.1, kernel-livepatch-SLE15-SP1_Update_7-1-3.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c69 --- Comment #69 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2946-1: An update that solves 12 vulnerabilities and has 93 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1114279,1117665,1119461,1119465,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1135966,1135967,1137040,1137799,1138190,1139073,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1150452,1150457,1150465,1150875,1151508,1152624,1152685,1152788,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153646,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1155178,1155179,1155184,1155186,1155671 CVE References: CVE-2018-12207,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: SUSE Linux Enterprise Workstation Extension 15 (src): kernel-default-4.12.14-150.41.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): kernel-default-4.12.14-150.41.1, kernel-docs-4.12.14-150.41.1, kernel-obs-qa-4.12.14-150.41.1 SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.41.1, kernel-livepatch-SLE15_Update_16-1-1.3.1 SUSE Linux Enterprise Module for Legacy Software 15 (src): kernel-default-4.12.14-150.41.1 SUSE Linux Enterprise Module for Development Tools 15 (src): kernel-docs-4.12.14-150.41.1, kernel-obs-build-4.12.14-150.41.1, kernel-source-4.12.14-150.41.1, kernel-syms-4.12.14-150.41.1, kernel-vanilla-4.12.14-150.41.1 SUSE Linux Enterprise Module for Basesystem 15 (src): kernel-default-4.12.14-150.41.1, kernel-source-4.12.14-150.41.1, kernel-zfcpdump-4.12.14-150.41.1 SUSE Linux Enterprise High Availability 15 (src): kernel-default-4.12.14-150.41.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c70 --- Comment #70 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2947-1: An update that solves 10 vulnerabilities and has 117 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1111666,1112178,1113994,1114279,1117665,1119461,1119465,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1135967,1137040,1137799,1137861,1138190,1139073,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1149853,1150452,1150457,1150465,1150875,1151508,1151807,1152033,1152624,1152665,1152685,1152696,1152697,1152788,1152790,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153607,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154242,1154268,1154354,1154372,1154521,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1155061,1155178,1155179,1155184,1155186,1155671,802154,814594,919448,9 87367,998153 CVE References: CVE-2018-12207,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666 Sources used: SUSE Linux Enterprise Workstation Extension 15-SP1 (src): kernel-default-4.12.14-197.26.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): kernel-debug-4.12.14-197.26.1, kernel-default-4.12.14-197.26.1, kernel-docs-4.12.14-197.26.1, kernel-kvmsmall-4.12.14-197.26.1, kernel-obs-qa-4.12.14-197.26.1, kernel-source-4.12.14-197.26.1, kernel-vanilla-4.12.14-197.26.1, kernel-zfcpdump-4.12.14-197.26.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.26.1, kernel-livepatch-SLE15-SP1_Update_7-1-3.5.1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src): kernel-default-4.12.14-197.26.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): kernel-docs-4.12.14-197.26.1, kernel-obs-build-4.12.14-197.26.1, kernel-source-4.12.14-197.26.1, kernel-syms-4.12.14-197.26.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): kernel-default-4.12.14-197.26.1, kernel-source-4.12.14-197.26.1, kernel-zfcpdump-4.12.14-197.26.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c71 --- Comment #71 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:2951-1: An update that solves 12 vulnerabilities and has 98 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1114279,1117665,1119461,1119465,1123034,1123080,1133140,1134303,1135642,1135854,1135873,1135967,1137040,1137799,1138190,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1150452,1150457,1150465,1150875,1151508,1152624,1152685,1152782,1152788,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154189,1154354,1154372,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1155178,1155179,1155184,1155186,1155671,1155692,1155836,1155982,1156187 CVE References: CVE-2018-12207,CVE-2019-10220,CVE-2019-11135,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-18805 Sources used: SUSE Linux Enterprise Module for Public Cloud 15 (src): kernel-azure-4.12.14-5.44.1, kernel-source-azure-4.12.14-5.44.1, kernel-syms-azure-4.12.14-5.44.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): kernel-source-azure-4.12.14-5.44.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard| |ibs:running:13395:important | |ibs:running:13394:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13395:important |ibs:running:13395:important |ibs:running:13394:important |ibs:running:13394:important | |ibs:running:13400:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c78 --- Comment #78 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:3200-1: An update that solves 44 vulnerabilities and has 258 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1048942,1050244,1050536,1050545,1051510,1054914,1055117,1055186,1061840,1064802,1065600,1065729,1066129,1071995,1073513,1082555,1082635,1083647,1086323,1087092,1089644,1090631,1091041,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1103990,1103991,1104353,1104427,1104745,1104967,1106434,1108043,1108382,1109158,1109837,1111666,1112178,1112374,1113722,1113994,1114279,1117169,1117665,1118661,1119086,1119113,1119461,1119465,1120902,1122363,1123034,1123080,1123105,1126390,1127155,1127354,1127371,1127988,1131107,1131304,1131489,1133140,1134476,1134983,1135642,1135854,1135873,1135966,1135967,1136261,1137040,1137069,1137223,1137236,1137799,1137861,1137865,1137959,1137982,1138039,1138190,1138539,1139073,1140090,1140155,1140729,1140845,1140883,1141013,1141340,1141543,1141600,1142076,1142635,1142667,1142924,1143706,1144338,1144375,1144449,1144653,1144903,1145099,1145661,1146042,1146612,1146664,1148133,1148410,1148712,1148859,1148868,114908 3,1149119,1149224,1149446,1149448,1149555,1149651,1149652,1149713,1149853,1149940,1149959,1149963,1149976,1150025,1150033,1150112,1150305,1150381,1150423,1150457,1150466,1150562,1150727,1150846,1150860,1150861,1150875,1150933,1151021,1151067,1151192,1151225,1151350,1151508,1151548,1151610,1151661,1151662,1151667,1151671,1151680,1151807,1151891,1151900,1151955,1152024,1152025,1152026,1152033,1152161,1152187,1152325,1152457,1152460,1152466,1152525,1152624,1152665,1152685,1152696,1152697,1152782,1152788,1152790,1152791,1152885,1152972,1152974,1152975,1153108,1153112,1153236,1153263,1153476,1153509,1153607,1153628,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154043,1154048,1154058,1154108,1154124,1154189,1154242,1154268,1154354,1154355,1154372,1154521,1154526,1154578,1154601,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1154959,1155021,1155061,1155178,1155179,1155184,1155186,1155671,1155689,1155692,1155836,1155897,1155982,115 6187,1156258,1156429,1156466,1156471,1156494,1156609,1156700,1156729,1156882,1156928,1157032,1157038,1157044,1157045,1157046,1157049,1157070,1157115,1157143,1157145,1157158,1157160,1157162,1157173,1157178,1157180,1157182,1157183,1157184,1157191,1157193,1157197,1157298,1157304,1157307,1157324,1157333,1157386,1157424,1157463,1157499,1157678,1157698,1157778,1157908,1158049,1158063,1158064,1158065,1158066,1158067,1158068 CVE References: CVE-2017-18595,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-14821,CVE-2019-14835,CVE-2019-14895,CVE-2019-15030,CVE-2019-15031,CVE-2019-15916,CVE-2019-16231,CVE-2019-16233,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17666,CVE-2019-18660,CVE-2019-18683,CVE-2019-18805,CVE-2019-18809,CVE-2019-19046,CVE-2019-19049,CVE-2019-19052,CVE-2019-19056,CVE-2019-19057,CVE-2019-19058,CVE-2019-19060,CVE-2019-19062,CVE-2019-19063,CVE-2019-19065,CVE-2019-19067,CVE-2019-19068,CVE-2019-19073,CVE-2019-19074,CVE-2019-19075,CVE-2019-19078,CVE-2019-19080,CVE-2019-19081,CVE-2019-19082,CVE-2019-19083,CVE-2019-19227,CVE-2019-9456,CVE-2019-9506 Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.7.1, kgraft-patch-SLE12-SP5_Update_1-1-8.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c79 --- Comment #79 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:3200-1: An update that solves 44 vulnerabilities and has 258 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1048942,1050244,1050536,1050545,1051510,1054914,1055117,1055186,1061840,1064802,1065600,1065729,1066129,1071995,1073513,1082555,1082635,1083647,1086323,1087092,1089644,1090631,1091041,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1103990,1103991,1104353,1104427,1104745,1104967,1106434,1108043,1108382,1109158,1109837,1111666,1112178,1112374,1113722,1113994,1114279,1117169,1117665,1118661,1119086,1119113,1119461,1119465,1120902,1122363,1123034,1123080,1123105,1126390,1127155,1127354,1127371,1127988,1131107,1131304,1131489,1133140,1134476,1134983,1135642,1135854,1135873,1135966,1135967,1136261,1137040,1137069,1137223,1137236,1137799,1137861,1137865,1137959,1137982,1138039,1138190,1138539,1139073,1140090,1140155,1140729,1140845,1140883,1141013,1141340,1141543,1141600,1142076,1142635,1142667,1142924,1143706,1144338,1144375,1144449,1144653,1144903,1145099,1145661,1146042,1146612,1146664,1148133,1148410,1148712,1148859,1148868,114908 3,1149119,1149224,1149446,1149448,1149555,1149651,1149652,1149713,1149853,1149940,1149959,1149963,1149976,1150025,1150033,1150112,1150305,1150381,1150423,1150457,1150466,1150562,1150727,1150846,1150860,1150861,1150875,1150933,1151021,1151067,1151192,1151225,1151350,1151508,1151548,1151610,1151661,1151662,1151667,1151671,1151680,1151807,1151891,1151900,1151955,1152024,1152025,1152026,1152033,1152161,1152187,1152325,1152457,1152460,1152466,1152525,1152624,1152665,1152685,1152696,1152697,1152782,1152788,1152790,1152791,1152885,1152972,1152974,1152975,1153108,1153112,1153236,1153263,1153476,1153509,1153607,1153628,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154043,1154048,1154058,1154108,1154124,1154189,1154242,1154268,1154354,1154355,1154372,1154521,1154526,1154578,1154601,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1154959,1155021,1155061,1155178,1155179,1155184,1155186,1155671,1155689,1155692,1155836,1155897,1155982,115 6187,1156258,1156429,1156466,1156471,1156494,1156609,1156700,1156729,1156882,1156928,1157032,1157038,1157044,1157045,1157046,1157049,1157070,1157115,1157143,1157145,1157158,1157160,1157162,1157173,1157178,1157180,1157182,1157183,1157184,1157191,1157193,1157197,1157298,1157304,1157307,1157324,1157333,1157386,1157424,1157463,1157499,1157678,1157698,1157778,1157908,1158049,1158063,1158064,1158065,1158066,1158067,1158068 CVE References: CVE-2017-18595,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-14821,CVE-2019-14835,CVE-2019-14895,CVE-2019-15030,CVE-2019-15031,CVE-2019-15916,CVE-2019-16231,CVE-2019-16233,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17666,CVE-2019-18660,CVE-2019-18683,CVE-2019-18805,CVE-2019-18809,CVE-2019-19046,CVE-2019-19049,CVE-2019-19052,CVE-2019-19056,CVE-2019-19057,CVE-2019-19058,CVE-2019-19060,CVE-2019-19062,CVE-2019-19063,CVE-2019-19065,CVE-2019-19067,CVE-2019-19068,CVE-2019-19073,CVE-2019-19074,CVE-2019-19075,CVE-2019-19078,CVE-2019-19080,CVE-2019-19081,CVE-2019-19082,CVE-2019-19083,CVE-2019-19227,CVE-2019-9456,CVE-2019-9506 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): kernel-default-4.12.14-122.7.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): kernel-docs-4.12.14-122.7.1, kernel-obs-build-4.12.14-122.7.1 SUSE Linux Enterprise Server 12-SP5 (src): kernel-default-4.12.14-122.7.1, kernel-source-4.12.14-122.7.1, kernel-syms-4.12.14-122.7.1 SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.7.1, kgraft-patch-SLE12-SP5_Update_1-1-8.7.1 SUSE Linux Enterprise High Availability 12-SP5 (src): kernel-default-4.12.14-122.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13395:important |ibs:running:13395:important |ibs:running:13394:important |ibs:running:13394:important |ibs:running:13400:important | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13395:important |ibs:running:13395:important |ibs:running:13394:important |ibs:running:13394:important | |ibs:running:13566:important -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c81 --- Comment #81 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:3294-1: An update that solves 16 vulnerabilities and has 124 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1048942,1050244,1050536,1050545,1051510,1055186,1061840,1064802,1065600,1066129,1073513,1082635,1083647,1086323,1087092,1089644,1090631,1091041,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1109158,1114279,1117665,1119461,1119465,1122363,1123034,1123080,1127155,1131107,1133140,1134303,1135642,1135854,1135873,1135966,1135967,1137040,1137799,1137861,1138190,1139073,1140090,1140729,1140845,1140883,1141600,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146612,1148410,1149119,1149448,1150452,1150457,1150465,1150466,1150875,1151225,1151508,1151680,1152497,1152505,1152506,1152624,1152685,1152782,1152788,1152791,1153112,1153158,1153236,1153263,1153476,1153509,1153628,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154124,1154189,1154354,1154372,1154526,1154578,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1154959,1155021,1155178,1155179,1155184,115518 6,1155671,1155692,1155812,1155817,1155836,1155945,1155982,1156187,1156429,1156466,1156494,1156609,1156700,1156729,1156882 CVE References: CVE-2018-12207,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-15916,CVE-2019-16231,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-18805 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP4 (src): kernel-rt-4.12.14-8.9.3, kernel-rt_debug-4.12.14-8.9.3, kernel-source-rt-4.12.14-8.9.3, kernel-syms-rt-4.12.14-8.9.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c82 --- Comment #82 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2019:3295-1: An update that solves 20 vulnerabilities and has 186 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1048942,1050244,1050536,1050545,1051510,1054914,1055117,1055186,1061840,1064802,1065600,1065729,1066129,1071995,1073513,1082555,1082635,1083647,1086323,1087092,1089644,1090631,1091041,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1104967,1109158,1111666,1112178,1113722,1113994,1114279,1117665,1119086,1119461,1119465,1123034,1123080,1127988,1131107,1131304,1133140,1134303,1135642,1135854,1135873,1135966,1135967,1137040,1137069,1137799,1137861,1137865,1137959,1137982,1138190,1139073,1140090,1140155,1140729,1140845,1140883,1141013,1141600,1142076,1142635,1142667,1143706,1144338,1144375,1144449,1144903,1145099,1146042,1146519,1146540,1146612,1146664,1148133,1148410,1148712,1148868,1149119,1149313,1149446,1149448,1149555,1149651,1149853,1150305,1150381,1150423,1150452,1150457,1150465,1150466,1150846,1150875,1151067,1151192,1151350,1151508,1151610,1151661,1151662,1151667,1151680,1151807,1151891,1151955,1152024,1152025,1152026,115203 3,1152161,1152187,1152243,1152325,1152457,1152460,1152466,1152497,1152505,1152506,1152525,1152624,1152665,1152685,1152696,1152697,1152782,1152788,1152790,1152791,1152972,1152974,1152975,1153112,1153158,1153236,1153263,1153476,1153509,1153607,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154108,1154124,1154189,1154242,1154268,1154354,1154372,1154521,1154526,1154578,1154601,1154607,1154608,1154610,1154611,1154651,1154737,1154747,1154848,1154858,1154905,1154956,1155021,1155061,1155178,1155179,1155184,1155186,1155671,1155692,1155812,1155817,1155836,1155945,1155982,1156187,1156429,1156466,1156494,1156609,1156700,1156729,1156882 CVE References: CVE-2017-18595,CVE-2018-12207,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-14821,CVE-2019-15291,CVE-2019-15916,CVE-2019-16231,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-18805,CVE-2019-9506 Sources used: SUSE Linux Enterprise Module for Realtime 15-SP1 (src): kernel-rt-4.12.14-14.14.3, kernel-rt_debug-4.12.14-14.14.3, kernel-source-rt-4.12.14-14.14.2, kernel-syms-rt-4.12.14-14.14.2 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): kernel-rt-4.12.14-14.14.3, kernel-rt_debug-4.12.14-14.14.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13395:important |ibs:running:13566:important |ibs:running:13394:important | |ibs:running:13566:important | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 http://bugzilla.suse.com/show_bug.cgi?id=1135854#c84 --- Comment #84 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2020:0093-1: An update that solves 80 vulnerabilities and has 310 fixes is now available. Category: security (important) Bug References: 1046299,1046303,1046305,1048942,1050244,1050536,1050545,1051510,1055117,1055186,1061840,1064802,1065600,1065729,1066129,1071995,1073513,1078248,1082555,1082635,1083647,1086323,1087092,1089644,1090631,1090888,1091041,1093205,1096254,1097583,1097584,1097585,1097586,1097587,1097588,1098291,1101674,1103989,1103990,1103991,1104353,1104427,1104745,1104967,1106434,1108043,1108382,1109158,1109837,1111666,1112178,1112374,1113722,1113956,1113994,1114279,1115026,1117169,1117665,1118661,1119086,1119113,1119461,1119465,1120853,1120902,1122363,1123034,1123080,1123105,1126206,1126390,1127155,1127354,1127371,1127611,1127988,1129770,1131107,1131304,1131489,1133140,1134476,1134973,1134983,1135642,1135854,1135873,1135966,1135967,1136261,1137040,1137069,1137223,1137236,1137799,1137861,1137865,1137959,1137982,1138039,1138190,1139073,1140090,1140155,1140729,1140845,1140883,1140948,1141013,1141340,1141543,1142076,1142095,1142635,1142667,1142924,1143706,1143959,1144333,1144338,1144375,1144449,1144653,114490 3,1145099,1145661,1146042,1146519,1146544,1146612,1146664,1148133,1148410,1148712,1148859,1148868,1149083,1149119,1149224,1149446,1149448,1149555,1149652,1149713,1149853,1149940,1149959,1149963,1149976,1150025,1150033,1150112,1150305,1150381,1150423,1150452,1150457,1150465,1150466,1150562,1150727,1150846,1150860,1150861,1150875,1150933,1151021,1151067,1151192,1151225,1151350,1151508,1151548,1151610,1151661,1151662,1151667,1151671,1151680,1151807,1151891,1151900,1151910,1151955,1152024,1152025,1152026,1152033,1152107,1152161,1152187,1152325,1152446,1152457,1152460,1152466,1152497,1152505,1152506,1152525,1152624,1152631,1152665,1152685,1152696,1152697,1152782,1152788,1152790,1152791,1152885,1152972,1152974,1152975,1153108,1153112,1153158,1153236,1153263,1153476,1153509,1153607,1153628,1153646,1153681,1153713,1153717,1153718,1153719,1153811,1153969,1154043,1154048,1154058,1154108,1154124,1154189,1154242,1154244,1154268,1154354,1154355,1154372,1154521,1154526,1154578,1154601,1154607,115 4608,1154610,1154611,1154651,1154737,1154768,1154848,1154858,1154905,1154916,1154956,1154959,1155021,1155061,1155178,1155179,1155184,1155186,1155331,1155334,1155671,1155689,1155692,1155812,1155817,1155836,1155897,1155921,1155945,1156187,1156258,1156259,1156286,1156429,1156462,1156466,1156471,1156494,1156609,1156700,1156729,1156882,1156928,1157032,1157038,1157042,1157044,1157045,1157046,1157049,1157070,1157115,1157143,1157145,1157158,1157160,1157162,1157169,1157171,1157173,1157178,1157180,1157182,1157183,1157184,1157191,1157193,1157197,1157298,1157303,1157304,1157307,1157324,1157333,1157386,1157424,1157463,1157499,1157678,1157698,1157778,1157853,1157895,1157908,1158021,1158049,1158063,1158064,1158065,1158066,1158067,1158068,1158071,1158082,1158094,1158132,1158381,1158394,1158398,1158407,1158410,1158413,1158417,1158427,1158445,1158533,1158637,1158638,1158639,1158640,1158641,1158643,1158644,1158645,1158646,1158647,1158649,1158651,1158652,1158819,1158823,1158824,1158827,1158834,1158893, 1158900,1158903,1158904,1158954,1159024,1159096,1159297,1159483,1159484,1159500,1159569,1159841,1159908,1159909,1159910,972655 CVE References: CVE-2017-18595,CVE-2018-12207,CVE-2019-0154,CVE-2019-0155,CVE-2019-10220,CVE-2019-11135,CVE-2019-14821,CVE-2019-14835,CVE-2019-14895,CVE-2019-14901,CVE-2019-15030,CVE-2019-15031,CVE-2019-15213,CVE-2019-15916,CVE-2019-16231,CVE-2019-16232,CVE-2019-16233,CVE-2019-16234,CVE-2019-16746,CVE-2019-16995,CVE-2019-17055,CVE-2019-17056,CVE-2019-17133,CVE-2019-17666,CVE-2019-18660,CVE-2019-18683,CVE-2019-18805,CVE-2019-18808,CVE-2019-18809,CVE-2019-19046,CVE-2019-19049,CVE-2019-19051,CVE-2019-19052,CVE-2019-19056,CVE-2019-19057,CVE-2019-19058,CVE-2019-19060,CVE-2019-19062,CVE-2019-19063,CVE-2019-19065,CVE-2019-19066,CVE-2019-19067,CVE-2019-19068,CVE-2019-19073,CVE-2019-19074,CVE-2019-19075,CVE-2019-19077,CVE-2019-19078,CVE-2019-19080,CVE-2019-19081,CVE-2019-19082,CVE-2019-19083,CVE-2019-19227,CVE-2019-19319,CVE-2019-19332,CVE-2019-19338,CVE-2019-19447,CVE-2019-19523,CVE-2019-19524,CVE-2019-19525,CVE-2019-19526,CVE-2019-19527,CVE-2019-19528,CVE-2019-19529,CVE-2019-19530,CVE-2019-19531,CVE-2019-1 9532,CVE-2019-19533,CVE-2019-19534,CVE-2019-19535,CVE-2019-19536,CVE-2019-19537,CVE-2019-19543,CVE-2019-19767,CVE-2019-19966,CVE-2019-20054,CVE-2019-20095,CVE-2019-20096,CVE-2019-9456,CVE-2019-9506 Sources used: SUSE Linux Enterprise Server 12-SP5 (src): kernel-azure-4.12.14-16.7.1, kernel-source-azure-4.12.14-16.7.1, kernel-syms-azure-4.12.14-16.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Swamp Workflow Management <swamp@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|ibs:running:13566:important | -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Libor Pechacek <lpechacek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- See Also| |http://bugzilla.suse.com/sh | |ow_bug.cgi?id=1170224 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1135854 Frank Kruger <fkrueger@mailbox.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC|fkrueger@mailbox.org | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1135854 Jeffrey Cheung <jcheung@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jcheung@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
participants (2)
-
bugzilla_noreply@novell.com
-
bugzilla_noreply@suse.com