[Bug 1180058] New: Please don't create /boot/do_purge_kernels on initial install
https://bugzilla.suse.com/show_bug.cgi?id=1180058 Bug ID: 1180058 Summary: Please don't create /boot/do_purge_kernels on initial install Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: dcermak@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Currently the %post scriptlet of the kernel creates /boot/do_purge_kernels to trigger zypper's kernel purging. Could this be modified so that it only creates this file on upgrades and *not* on fresh installations? Currently this will cause zypper to try to purge old kernels on fresh installations. While that is short, it can cause noticeable delays until zypper can be used again, especially in resource constrained systems. Could the creation of this file be adjusted so that it is only created on upgrades and not on new installations? -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c1 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jslaby@suse.com Component|Kernel |libzypp Assignee|kernel-bugs@opensuse.org |zypp-maintainers@suse.de --- Comment #1 from Jiri Slaby <jslaby@suse.com> --- (In reply to Dan ��erm��k from comment #0)
Could the creation of this file be adjusted so that it is only created on upgrades and not on new installations?
Not on the kernel (spec) level, I am afraid. The kernel's %post script has no idea whether it is a first install or update. This is due to allowance of multiple kernels installed in parallel -- kernel is not updated (rpm -U), it is installed (rpm -i). So if anything, zypper could do this by deleting /boot/do_purge_kernels during the very first purge-kernels, instead of doing the real purge. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c2 Michael Andres <ma@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Component|libzypp |Kernel Assignee|zypp-maintainers@suse.de |kernel-bugs@opensuse.org --- Comment #2 from Michael Andres <ma@suse.com> --- (In reply to Jiri Slaby from comment #1)
@Jiri, -i/-U does not matter. Rpm always passes as $1 the number of package instances installed. So you can see if you're the first, or the last,...:
AFAIK it's dracut who evaluates /boot/do_purge_kernels. So if it is not appropriate to call zypper, the scripts there should not do it. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c3 --- Comment #3 from Takashi Iwai <tiwai@suse.com> --- Thanks for explanation. I'm going to push the fix, touching /boot/do_purge_kernels only if $1 is greater than 1 in post.sh. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c9 --- Comment #9 from OBSbugzilla Bot <bwiedemann+obsbugzillabot@suse.com> --- This is an autogenerated message for OBS integration: This bug (1180058) was mentioned in https://build.opensuse.org/request/show/876318 15.2 / kernel-source -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c18 --- Comment #18 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:0393-1: An update that solves 9 vulnerabilities and has 115 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1132477,1151927,1152472,1152489,1154353,1155518,1156395,1163776,1169514,1170442,1176248,1176855,1177109,1177326,1177440,1177529,1178142,1178995,1179082,1179137,1179243,1179428,1179660,1179929,1180058,1180846,1180964,1180989,1181133,1181259,1181544,1181574,1181637,1181655,1181671,1181674,1181710,1181720,1181735,1181736,1181738,1181747,1181753,1181818,1181843,1181854,1181896,1181958,1181960,1181985,1182047,1182118,1182128,1182140,1182171,1182175,1182259,1182265,1182266,1182267,1182268,1182271,1182272,1182273,1182275,1182276,1182278,1182283,1182374,1182380,1182381,1182406,1182430,1182439,1182441,1182442,1182443,1182444,1182445,1182446,1182447,1182449,1182454,1182455,1182456,1182457,1182458,1182459,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182485,1182489,1182490,1182547,1182558,1182560,1182561,1182571,1182599,1182602,1182626,1182650,1182672,1182676,1182683,1182684,1182686,1182697,1182770,1182798,1182800,1182801,1182854,1182856 CVE References: CVE-2020-12362,CVE-2020-12363,CVE-2020-12364,CVE-2020-12373,CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: openSUSE Leap 15.2 (src): kernel-debug-5.3.18-lp152.66.2, kernel-default-5.3.18-lp152.66.2, kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2, kernel-docs-5.3.18-lp152.66.2, kernel-kvmsmall-5.3.18-lp152.66.2, kernel-obs-build-5.3.18-lp152.66.2, kernel-obs-qa-5.3.18-lp152.66.2, kernel-preempt-5.3.18-lp152.66.2, kernel-source-5.3.18-lp152.66.2, kernel-syms-5.3.18-lp152.66.2 -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c19 --- Comment #19 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0738-1: An update that solves 9 vulnerabilities and has 114 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1132477,1151927,1152472,1152489,1154353,1155518,1156395,1163776,1169514,1170442,1176248,1176855,1177109,1177326,1177440,1177529,1178142,1178995,1179082,1179137,1179243,1179428,1179660,1179929,1180058,1180846,1180964,1180989,1181133,1181259,1181544,1181574,1181637,1181655,1181671,1181674,1181710,1181720,1181735,1181736,1181738,1181747,1181753,1181818,1181843,1181854,1181896,1181958,1181960,1181985,1182047,1182118,1182128,1182140,1182171,1182175,1182259,1182265,1182266,1182267,1182268,1182271,1182272,1182273,1182275,1182276,1182278,1182283,1182374,1182380,1182381,1182406,1182430,1182439,1182441,1182442,1182443,1182444,1182445,1182446,1182447,1182449,1182454,1182455,1182456,1182457,1182458,1182459,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182485,1182489,1182490,1182547,1182558,1182560,1182561,1182571,1182599,1182602,1182626,1182650,1182672,1182676,1182683,1182684,1182686,1182770,1182798,1182800,1182801,1182854,1182856 CVE References: CVE-2020-12362,CVE-2020-12363,CVE-2020-12364,CVE-2020-12373,CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src): kernel-azure-5.3.18-18.38.1, kernel-source-azure-5.3.18-18.38.1, kernel-syms-azure-5.3.18-18.38.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c20 --- Comment #20 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0739-1: An update that solves one vulnerability and has 67 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1114648,1163617,1163930,1169514,1170442,1176855,1177440,1178049,1179082,1179142,1179612,1179709,1180058,1181346,1181504,1181574,1181671,1181809,1181854,1181896,1181931,1181960,1181985,1181987,1181996,1181998,1182038,1182047,1182118,1182130,1182140,1182171,1182173,1182175,1182182,1182184,1182195,1182242,1182243,1182248,1182269,1182302,1182307,1182310,1182438,1182447,1182448,1182449,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182560,1182561,1182571,1182590,1182610,1182612,1182650,1182652 CVE References: CVE-2021-3348 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): kernel-azure-4.12.14-16.47.1, kernel-source-azure-4.12.14-16.47.1, kernel-syms-azure-4.12.14-16.47.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c21 --- Comment #21 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0735-1: An update that solves 9 vulnerabilities and has 112 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1132477,1151927,1152472,1152489,1154353,1155518,1156395,1163776,1169514,1170442,1176248,1176855,1177109,1177326,1177440,1177529,1178142,1179082,1179137,1179243,1179428,1179660,1179929,1180058,1180846,1180989,1181133,1181259,1181574,1181637,1181655,1181671,1181674,1181710,1181720,1181735,1181736,1181738,1181747,1181753,1181818,1181843,1181854,1181896,1181958,1181960,1181985,1182047,1182118,1182128,1182140,1182171,1182175,1182259,1182265,1182266,1182267,1182268,1182271,1182272,1182273,1182275,1182276,1182278,1182283,1182374,1182380,1182381,1182406,1182430,1182439,1182441,1182442,1182443,1182444,1182445,1182446,1182447,1182449,1182454,1182455,1182456,1182457,1182458,1182459,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182485,1182489,1182490,1182547,1182558,1182560,1182561,1182571,1182599,1182602,1182626,1182650,1182672,1182676,1182683,1182684,1182686,1182770,1182798,1182800,1182801,1182854,1182856,1183022 CVE References: CVE-2020-12362,CVE-2020-12363,CVE-2020-12364,CVE-2020-12373,CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: SUSE Linux Enterprise Module for Realtime 15-SP2 (src): kernel-rt-5.3.18-28.1, kernel-rt_debug-5.3.18-28.1, kernel-source-rt-5.3.18-28.1, kernel-syms-rt-5.3.18-28.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c22 --- Comment #22 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0741-1: An update that solves 9 vulnerabilities and has 117 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1132477,1151927,1152472,1152489,1154353,1155518,1156395,1163776,1169514,1170442,1176248,1176855,1177109,1177326,1177440,1177529,1178142,1178995,1179082,1179137,1179243,1179428,1179660,1179929,1180058,1180846,1180964,1180989,1181133,1181259,1181544,1181574,1181637,1181655,1181671,1181674,1181710,1181720,1181735,1181736,1181738,1181747,1181753,1181818,1181843,1181854,1181896,1181958,1181960,1181985,1182047,1182110,1182118,1182128,1182140,1182171,1182175,1182259,1182265,1182266,1182267,1182268,1182271,1182272,1182273,1182275,1182276,1182278,1182283,1182341,1182374,1182380,1182381,1182406,1182430,1182439,1182441,1182442,1182443,1182444,1182445,1182446,1182447,1182449,1182454,1182455,1182456,1182457,1182458,1182459,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182485,1182489,1182490,1182507,1182547,1182558,1182560,1182561,1182571,1182599,1182602,1182626,1182650,1182672,1182676,1182683,1182684,1182686,1182770,1182798,1182800,1182801,118285 4,1182856 CVE References: CVE-2020-12362,CVE-2020-12363,CVE-2020-12364,CVE-2020-12373,CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: SUSE MicroOS 5.0 (src): kernel-default-5.3.18-24.52.1, kernel-default-base-5.3.18-24.52.1.9.24.1 SUSE Linux Enterprise Workstation Extension 15-SP2 (src): kernel-default-5.3.18-24.52.1, kernel-preempt-5.3.18-24.52.1 SUSE Linux Enterprise Module for Live Patching 15-SP2 (src): kernel-default-5.3.18-24.52.1, kernel-livepatch-SLE15-SP2_Update_11-1-5.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP2 (src): kernel-default-5.3.18-24.52.1 SUSE Linux Enterprise Module for Development Tools 15-SP2 (src): kernel-docs-5.3.18-24.52.1, kernel-obs-build-5.3.18-24.52.1, kernel-preempt-5.3.18-24.52.1, kernel-source-5.3.18-24.52.1, kernel-syms-5.3.18-24.52.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): kernel-default-5.3.18-24.52.1, kernel-default-base-5.3.18-24.52.1.9.24.1, kernel-preempt-5.3.18-24.52.1, kernel-source-5.3.18-24.52.1 SUSE Linux Enterprise High Availability 15-SP2 (src): kernel-default-5.3.18-24.52.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c23 --- Comment #23 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0736-1: An update that solves 5 vulnerabilities and has 14 fixes is now available. Category: security (important) Bug References: 1065600,1163592,1176831,1178401,1178762,1179014,1179015,1179045,1179082,1179428,1179660,1180058,1180906,1181441,1181747,1181753,1181843,1182140,1182175 CVE References: CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): kernel-default-4.12.14-95.71.1, kernel-source-4.12.14-95.71.1, kernel-syms-4.12.14-95.71.1 SUSE OpenStack Cloud 9 (src): kernel-default-4.12.14-95.71.1, kernel-source-4.12.14-95.71.1, kernel-syms-4.12.14-95.71.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): kernel-default-4.12.14-95.71.1, kernel-source-4.12.14-95.71.1, kernel-syms-4.12.14-95.71.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): kernel-default-4.12.14-95.71.1, kernel-source-4.12.14-95.71.1, kernel-syms-4.12.14-95.71.1 SUSE Linux Enterprise Live Patching 12-SP4 (src): kernel-default-4.12.14-95.71.1, kgraft-patch-SLE12-SP4_Update_19-1-6.3.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.71.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c24 --- Comment #24 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0737-1: An update that solves 5 vulnerabilities and has 14 fixes is now available. Category: security (important) Bug References: 1065600,1163617,1170442,1176855,1179082,1179428,1179660,1180058,1180262,1180964,1181671,1181747,1181753,1181843,1181854,1182047,1182130,1182140,1182175 CVE References: CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: SUSE Manager Server 4.0 (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1, kernel-zfcpdump-4.12.14-197.86.1 SUSE Manager Retail Branch Server 4.0 (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE Manager Proxy 4.0 (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1, kernel-zfcpdump-4.12.14-197.86.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.86.1, kernel-livepatch-SLE15-SP1_Update_23-1-3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.86.1 SUSE Enterprise Storage 6 (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 SUSE CaaS Platform 4.0 (src): kernel-default-4.12.14-197.86.1, kernel-docs-4.12.14-197.86.1, kernel-obs-build-4.12.14-197.86.1, kernel-source-4.12.14-197.86.1, kernel-syms-4.12.14-197.86.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c25 --- Comment #25 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0740-1: An update that solves 5 vulnerabilities and has 11 fixes is now available. Category: security (important) Bug References: 1065600,1163592,1178401,1178762,1179014,1179015,1179045,1179082,1179428,1179660,1180058,1181747,1181753,1181843,1182140,1182175 CVE References: CVE-2020-29368,CVE-2020-29374,CVE-2021-26930,CVE-2021-26931,CVE-2021-26932 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15 (src): kernel-default-4.12.14-150.69.1, kernel-docs-4.12.14-150.69.1, kernel-obs-build-4.12.14-150.69.1, kernel-source-4.12.14-150.69.1, kernel-syms-4.12.14-150.69.1, kernel-vanilla-4.12.14-150.69.1 SUSE Linux Enterprise Server 15-LTSS (src): kernel-default-4.12.14-150.69.1, kernel-docs-4.12.14-150.69.1, kernel-obs-build-4.12.14-150.69.1, kernel-source-4.12.14-150.69.1, kernel-syms-4.12.14-150.69.1, kernel-vanilla-4.12.14-150.69.1, kernel-zfcpdump-4.12.14-150.69.1 SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.69.1, kernel-livepatch-SLE15_Update_23-1-1.3.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): kernel-default-4.12.14-150.69.1, kernel-docs-4.12.14-150.69.1, kernel-obs-build-4.12.14-150.69.1, kernel-source-4.12.14-150.69.1, kernel-syms-4.12.14-150.69.1, kernel-vanilla-4.12.14-150.69.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): kernel-default-4.12.14-150.69.1, kernel-docs-4.12.14-150.69.1, kernel-obs-build-4.12.14-150.69.1, kernel-source-4.12.14-150.69.1, kernel-syms-4.12.14-150.69.1, kernel-vanilla-4.12.14-150.69.1 SUSE Linux Enterprise High Availability 15 (src): kernel-default-4.12.14-150.69.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c26 --- Comment #26 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:0742-1: An update that solves one vulnerability and has 67 fixes is now available. Category: security (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1114648,1163617,1163930,1169514,1170442,1176855,1177440,1178049,1179082,1179142,1179612,1179709,1180058,1181346,1181504,1181574,1181671,1181809,1181854,1181896,1181931,1181960,1181985,1181987,1181996,1181998,1182038,1182047,1182118,1182130,1182140,1182171,1182173,1182175,1182182,1182184,1182195,1182242,1182243,1182248,1182269,1182302,1182307,1182310,1182438,1182447,1182448,1182449,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182560,1182561,1182571,1182590,1182610,1182612,1182650,1182652 CVE References: CVE-2021-3348 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): kernel-default-4.12.14-122.63.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): kernel-docs-4.12.14-122.63.1, kernel-obs-build-4.12.14-122.63.1 SUSE Linux Enterprise Server 12-SP5 (src): kernel-default-4.12.14-122.63.1, kernel-source-4.12.14-122.63.1, kernel-syms-4.12.14-122.63.1 SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.63.1, kgraft-patch-SLE12-SP5_Update_16-1-8.3.1 SUSE Linux Enterprise High Availability 12-SP5 (src): kernel-default-4.12.14-122.63.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c27 --- Comment #27 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2021:0767-1: An update that has 67 recommended fixes can now be installed. Category: recommended (important) Bug References: 1065600,1065729,1078720,1081134,1084610,1114648,1163617,1163930,1169514,1170442,1176855,1177440,1178049,1179082,1179142,1179612,1179709,1180058,1181346,1181574,1181671,1181809,1181854,1181896,1181931,1181960,1181985,1181987,1181996,1181998,1182038,1182047,1182118,1182130,1182140,1182171,1182173,1182175,1182182,1182184,1182195,1182242,1182243,1182248,1182269,1182302,1182307,1182310,1182438,1182447,1182448,1182449,1182460,1182461,1182462,1182463,1182464,1182465,1182466,1182560,1182561,1182571,1182590,1182610,1182612,1182650,1182652 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Real Time Extension 12-SP5 (src): kernel-rt-4.12.14-10.34.2, kernel-rt_debug-4.12.14-10.34.2, kernel-source-rt-4.12.14-10.34.1, kernel-syms-rt-4.12.14-10.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1180058 https://bugzilla.suse.com/show_bug.cgi?id=1180058#c30 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #30 from Takashi Iwai <tiwai@suse.com> --- Forgot to close. -- You are receiving this mail because: You are the assignee for the bug.
participants (1)
-
bugzilla_noreply@suse.com