Bugzilla – Bug 1029961
[META] Finalize UsrMerge
Last modified: 2024-01-15 14:19:42 UTC
Some packages still install files to /bin that are not symlinks. A "find /bin -type f -exec rpm -qf {} \; | sort -u" on a recent TW yields: bash-4.4-95.1.x86_64 dbus-1-1.10.16-1.1.x86_64 keyutils-1.5.9-5.33.x86_64 ksh-93v-6.15.x86_64 net-tools-deprecated-1.60-770.1.x86_64 procps-3.3.12-3.1.x86_64 psmisc-22.21-6.9.x86_64 rpm-4.13.0.1-1.1.x86_64 sash-3.8-2.8.x86_64 sysvinit-tools-2.88+-103.1.x86_64 tar-1.29-3.1.x86_64 tcsh-6.20.00-3.1.x86_64 util-linux-2.29.1-1.1.x86_64 vim-8.0.324-2.1.x86_64 These packages should all install their binaries to %_bindir, i.e. /usr/bin, and have a symlink in /bin. This would finalize the /bin deprecation. I am opening bugs for each of the packages. Once they are all closed, I'll close this one.
Please stop to enforce to move /bin/bash and/or /bin/csh or /bin/tcsh to /usr/bin/ ... I do not agree with this. It is rather useless to move essential user command binaries (for use by all users) from /bin/ to /usr/bin/ and link them back to /usr/bin/ http://refspecs.linuxfoundation.org/FHS_3.0/fhs-3.0.html#binEssentialUserCommandBinaries
Quoting the linked text: "/bin contains commands that may be used by both the system administrator and by users, but which are required when no other filesystems are mounted (e.g. in single user mode)." With systemd, the notion of /usr potentially not being available is over. It has to be part of the root file system, or in a filesystem that can be mounted simultaniously. In that sense, we already obsoleted that part of FHS 3.0 implicitly by moving to systemd. We do not have to do symlinks and do like Fedora does, i.e. symlinking /bin to /usr/bin. However, dimstar pointed out that this could cause problems with legacy packages. that install a file to /bin while another package has the same file in /usr/bin. Either way, having _some_ base system packages in /bin and not others is not helping the cause. And IMHO, there is neither a good point nor a feasible way in re-introducing /bin, nor would it have a real purpose. Please help me out if I am missing something essential here (other than adhering to an already implicitly obsoleted standard).
(In reply to Dr. Werner Fink from comment #1) > Please stop to enforce to move /bin/bash and/or /bin/csh or /bin/tcsh to > /usr/bin/ ... I do not agree with this. It is rather useless to move > essential user command binaries (for use by all users) from /bin/ to > /usr/bin/ and link them back to /usr/bin/ > > http://refspecs.linuxfoundation.org/FHS_3.0/fhs-3.0. > html#binEssentialUserCommandBinaries fun fact: a symlink of /bin/bash to /usr/bin/bash is even covered by FHS-3.0: The following commands, or symbolic links to commands, are required in /bin: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
(In reply to Dominique Leuenberger from comment #3) Oh ... more binaries below /usr/bin and /usr/sbin helps a lot in usability ... sorry but I can not follow this! This overcompliance in the course of having only one root parition which includes also /usr had loosed the sight on usability. IMHO essential commands (which includes login shells!) for user below /bin and essential system commands below /sbin should stay there. And using symbloc links to not help here: ls -d1 /usr/bin/* /usr/sbin/* | wc -l 4410
sysvinit-tools boo#1029976 Essential commands for user and system belongs to /bin respectively /sbin. no need to use symbolic links from the overcrowded /usr/bin respectively /usr/sbin
Thanks for following up on this Daniel! We really need to clean up the mess we got into. I am not so sure that we went the right way though. The compat symlinks that were put in packages could be self-defeating. At some point in time /bin needs to be switched to a symlink to /usr/bin. Rpm will follow that link so packages installing files in /bin will continue to work just fine. However, how does rpm behave when packages contain both links in /bin as well as binaries in /usr/bin? What would rpm -V say? So I was thinking whether a better way would be to not actually package compat symlinks but rather create them with some helper in %post as long as /bin is not a symlink itself yet. We'd need a way to tag files that are meant to have a compat symlink then.
(In reply to Ludwig Nussel from comment #6) What is wrong on Essential Commands? Such a symbolic link /usr/bin -> /bin definitly breaks the sense Essential Commands.
I can remember maintaining DEC stations (partly System V.4) and AFAICR the symbolic link /bin was always a source of making things worse at maintenance and/or adding third party packages.
Oh my. 1) you'll get a conflict for the files if /bin is a symlink to /usr/bin 2) rpm absolutly cannot replace directories with symlinks. You need some evil pretrans lua script for this. 3) do *not* add a %post shell script to hundreds of packages, you'll just get dependency cycles! If you have to do that, you'll need again to do it with lua 4) I see no way to make /bin a symlink while supporting a system update 5) beware of file provides! those things know nothing about /bin being a symlink to /usr/bin. Rpm will report dependency errors for /bin file provides. Fedora had lots of fun with those... 6) This whole exercise is pointless, as there's no benefit at all for our users ;)
(In reply to Michael Schröder from comment #9) > 1) you'll get a conflict for the files if /bin is a symlink to /usr/bin IOW those compat symlinks as we have now need to go and be replaced by a different solution. > 2) rpm absolutly cannot replace directories with symlinks. You need some > evil pretrans lua script for this. Fedora does the move in the initrd, just like /var/run -> /run was done. So until the system gets rebooted a compat solution needs to be in place. > 3) do *not* add a %post shell script to hundreds of packages, you'll just > get dependency cycles! If you have to do that, you'll need again to do it > with lua > > 4) I see no way to make /bin a symlink while supporting a system update see 2) > 5) beware of file provides! those things know nothing about /bin being a > symlink to /usr/bin. Rpm will report dependency errors for /bin file > provides. Fedora had lots of fun with those... So that might be the magic trigger/tag. We can list all file requires for /bin/* by querying all current packages and then make sure the provides get installed even on migrated packages. > 6) This whole exercise is pointless, as there's no benefit at all for our > users ;) Not yet. It may pay off if start thinking about btrfs subvolumes and the role of /etc, /var etc. And we need to move the rpmdb to /usr :-)
Agreeing with all Ludwig said. NB: This the full record on how Fedora did the migration: https://fedoraproject.org/wiki/Features/UsrMove#Roadmap.
That document is missing all of the problems they ran into (and I know they had plenty). You need to find some post-mortem analysis.
Hello Daniel, sash is designated to work when nothing else does, see https://en.wikipedia.org/wiki/Stand-alone_shell Is it really safe to move it to /usr/bin?
There is a big problem with RPM that does not understand replacement of directory by symlink. Even worse, it will do crazy things with files being moved from /bin to /usr/bin. Bad example: Move all files from /bin to /usr/bin, then remove empty /bin dir and create symlink from /usr/bin to /bin. Then update bash that moves /bin/bash to /usr/bin/bash. What wrong happens during update? Variant A: package with compatibility symlink - RPM places new /usr/bin/bash - RPM places compatibility symlink /bin/bash Compatibility symlink replaces /usr/bin/bash and becomes infinitely looping symlink. => Depending on order of placing files by RPM, there is a 50% chance that things will go totally wrong. 2) RPM goes to remove obsolete files. /bin/bash is no more part of the package, delete it. In fact, /usr/bin/bash was deleted. Variant B: package without compatibility symlink 1) RPM places new /usr/bin/bash 2) RPM goes to remove obsolete files. /bin/bash is no more part of the package, delete it. In fact, /usr/bin/bash was deleted. => Totally wrong. As Michael wrote, there are only two chances to upgrade such system: 1) lua pretrans magic 2) direct rpm database manipulation
(In reply to Petr Gajdos from comment #13) > Hello Daniel, > > sash is designated to work when nothing else does, see > https://en.wikipedia.org/wiki/Stand-alone_shell > > Is it really safe to move it to /usr/bin? I think so. There is no boot without /usr anymore. If its meant for recovery, it should probably be part of initramfs, i.e. provide an module for dracut.
(In reply to Stanislav Brabec from comment #14) > [...] > As Michael wrote, there are only two chances to upgrade such system: > > 1) lua pretrans magic > > 2) direct rpm database manipulation 3) - do not package compat symlinks. Run something post install of each package that installs such links if /bin is a directory and the package /bin/$something in it's provides tags. - Make the initrd move away /bin and install the /bin -> /usr/bin symlink (same for sbin and lib).
Ludwig Nussel, comment 16: 3) - do not package compat symlinks. Run something post install of each package that installs such links if /bin is a directory and the package /bin/$something in it's provides tags. - Make the initrd move away /bin and install the /bin -> /usr/bin symlink (same for sbin and lib). If would work only if /bin will not be a symlink. But if /bin will not be a symlink, we do not need any hacks. Such upgrade works out of the box. Replacement of file by symlink is supported by RPM. Replacement of directory by symlink is not supported by RPM.
(In reply to Stanislav Brabec from comment #17) > Ludwig Nussel, comment 16: > > 3) - do not package compat symlinks. Run something post install of > each package that installs such links if /bin is a directory and > the package /bin/$something in it's provides tags. > - Make the initrd move away /bin and install the /bin -> /usr/bin > symlink (same for sbin and lib). > > If would work only if /bin will not be a symlink. It's a transition plan, so yes, it's meant to work with /bin being a directory :-) Once initrd has converted the directory to a symlink, the compat code to generate symlinks in /bin mustn't run anymore.
What is a progress here? Are we going to do the /bin -> /usr/bin symlink and hack initrd and rpm database to notice it?
looks like nobody is working on this
So what about to close it and close all inherited bugs?
that doesn't make the problem go away. If needed it needs to be escalated through management to assign resources to find a solution.
Assining to Ludwig as discussed.
TODO: kernel wants to load firmware from /lib always
As a first step I'll wrap the existing unconditional compat symlinks with a conditional "%if !0%{?usrmerged}" https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/thread/2PXEEHHWPGCWJDXFVWONW67AY2STQ63Q/
some packages also still have libs in /%{_libs}. Since even the bash binary is in /usr nowadays we can move those libs to %_libdir right away.
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/849585 Factory / cryptsetup
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/849620 Factory / fipscheck https://build.opensuse.org/request/show/849621 Factory / keyutils
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/849693 Factory / tcsh
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/850168 Factory / insserv-compat
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/850824 Factory / dmraid
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/851796 Factory / ecryptfs-utils
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/852030 Factory / syslogd
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/852376 Factory / crda
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/867115 Factory / hostname
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/867651 Factory / mailx https://build.opensuse.org/request/show/867652 Factory / mailutils
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/868447 Factory / apparmor
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/868682 Factory / dracut
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/868872 Factory / gcc10
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/869783 Factory / mksh
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/870280 Factory / post-build-checks
Hi Ludwig: They said the modification on plymouth for this bug caused "Bug 1179849 - plymouth rpm output: bad invocation of systemd-sysv-convert: too few arguments", and Arjen has submit a fix to resolve the issue. The fix looks good for me, could you please have a look if it has bad effect to your target(this bug). Thank you so much! https://build.opensuse.org/request/show/871759 https://bugzilla.opensuse.org/show_bug.cgi?id=1179849
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/873392 Factory / glibc
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/875937 Factory / sysvinit
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/876766 Factory / wicked
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/881371 Factory / ceph
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/882117 Factory / scsh
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/883212 Factory / ksh
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/884011 Factory / rpm-config-SUSE
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/885341 Factory / rpm-config-SUSE
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/888529 15.2 / f2fs-tools
openSUSE-RU-2021:0645-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1029961 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): f2fs-tools-1.14.0-lp152.4.3.1
SUSE-RU-2021:1796-1: An update that has 7 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1106014,1178577,1178624,1178675,1182016,1185337 CVE References: JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): gcc10-10.3.0+git1587-1.6.2 SUSE OpenStack Cloud Crowbar 8 (src): gcc10-10.3.0+git1587-1.6.2 SUSE OpenStack Cloud 9 (src): gcc10-10.3.0+git1587-1.6.2 SUSE OpenStack Cloud 8 (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server for SAP 12-SP4 (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server for SAP 12-SP3 (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server 12-SP5 (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server 12-SP4-LTSS (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server 12-SP3-LTSS (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server 12-SP3-BCL (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Server 12-SP2-BCL (src): gcc10-10.3.0+git1587-1.6.2 SUSE Linux Enterprise Module for Toolchain 12 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.1, gcc10-10.3.0+git1587-1.6.2 HPE Helion Openstack 8 (src): gcc10-10.3.0+git1587-1.6.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2021:1861-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1106014,1178577,1178624,1178675,1182016 CVE References: JIRA References: Sources used: SUSE MicroOS 5.0 (src): gcc10-10.3.0+git1587-1.6.4 SUSE Manager Server 4.0 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Manager Retail Branch Server 4.0 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Manager Proxy 4.0 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Server for SAP 15-SP1 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Server for SAP 15 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Server 15-SP1-LTSS (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Server 15-SP1-BCL (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Server 15-LTSS (src): gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Module for Development Tools 15-SP2 (src): gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE Enterprise Storage 6 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 SUSE CaaS Platform 4.0 (src): cross-nvptx-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:0854-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1106014,1178577,1178624,1178675,1182016 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): cross-nvptx-gcc10-10.3.0+git1587-lp152.5.1, gcc10-10.2.1+git583-lp152.4.1
I think this can be closed now? :)
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/902782 15.3 / bash
openSUSE-RU-2021:1861-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1106014,1178577,1178624,1178675,1182016 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): cross-aarch64-gcc10-10.3.0+git1587-1.6.3, cross-arm-gcc10-10.3.0+git1587-1.6.3, cross-hppa-gcc10-10.3.0+git1587-1.6.3, cross-i386-gcc10-10.3.0+git1587-1.6.3, cross-m68k-gcc10-10.3.0+git1587-1.6.3, cross-mips-gcc10-10.3.0+git1587-1.6.3, cross-nvptx-gcc10-10.3.0+git1587-1.6.3, cross-ppc64-gcc10-10.3.0+git1587-1.6.3, cross-ppc64le-gcc10-10.3.0+git1587-1.6.3, cross-riscv64-gcc10-10.3.0+git1587-1.6.3, cross-s390x-gcc10-10.3.0+git1587-1.6.3, cross-sparc-gcc10-10.3.0+git1587-1.6.3, cross-sparc64-gcc10-10.3.0+git1587-1.6.3, cross-x86_64-gcc10-10.3.0+git1587-1.6.3, gcc10-10.3.0+git1587-1.6.4, gcc10-testresults-10.3.0+git1587-1.6.7
openSUSE-RU-2021:2568-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1185103,1185175,1187567 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): open-vm-tools-11.3.0-10.1
SUSE-RU-2021:2569-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1185103,1185175,1187567 CVE References: JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): open-vm-tools-11.3.0-4.36.1 SUSE OpenStack Cloud 9 (src): open-vm-tools-11.3.0-4.36.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): open-vm-tools-11.3.0-4.36.1 SUSE Linux Enterprise Server 12-SP5 (src): open-vm-tools-11.3.0-4.36.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): open-vm-tools-11.3.0-4.36.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2021:2568-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1185103,1185175,1187567 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src): open-vm-tools-11.3.0-10.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): open-vm-tools-11.3.0-10.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2021:2571-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1185103,1185175,1187567 CVE References: JIRA References: Sources used: SUSE MicroOS 5.0 (src): open-vm-tools-11.3.0-5.16.4.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (src): open-vm-tools-11.3.0-5.16.4.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): open-vm-tools-11.3.0-5.16.4.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2021:2628-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1180997,1185103,1185175,1187567 CVE References: JIRA References: Sources used: SUSE Manager Server 4.0 (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Manager Retail Branch Server 4.0 (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Manager Proxy 4.0 (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): open-vm-tools-11.3.0-4.37.7.1 SUSE Enterprise Storage 6 (src): open-vm-tools-11.3.0-4.37.7.1 SUSE CaaS Platform 4.0 (src): open-vm-tools-11.3.0-4.37.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:1128-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1180997,1185103,1185175,1187567 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): open-vm-tools-11.3.0-lp152.3.12.1
# maintenance_jira_update_notice SUSE-RU-2021:3115-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1174697,1176206,1176934,1179382,1188891 CVE References: JIRA References: Sources used: SUSE MicroOS 5.0 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Manager Server 4.0 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Manager Retail Branch Server 4.0 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Manager Proxy 4.0 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Server for SAP 15 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Server 15-LTSS (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE Enterprise Storage 6 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 SUSE CaaS Platform 4.0 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice SUSE-RU-2021:3116-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1174697,1176206,1176934,1179382,1188891 CVE References: JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE OpenStack Cloud Crowbar 8 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE OpenStack Cloud 9 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE OpenStack Cloud 8 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server 12-SP5 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 HPE Helion Openstack 8 (src): mozilla-nspr-4.32-19.18.1, mozilla-nss-3.68-58.54.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice openSUSE-RU-2021:3115-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1174697,1176206,1176934,1179382,1188891 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1
# maintenance_jira_update_notice SUSE-RU-2021:3115-2: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1174697,1176206,1176934,1179382,1188891 CVE References: JIRA References: Sources used: SUSE MicroOS 5.1 (src): mozilla-nspr-4.32-3.20.1, mozilla-nss-3.68-3.56.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice openSUSE-RU-2021:1293-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1174697,1176206,1176934,1179382,1188891 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): mozilla-nspr-4.32-lp152.2.6.1, mozilla-nss-3.68-lp152.2.10.1
SUSE-RU-2021:14818-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1174697,1176206,1176934,1179382,1188891 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): mozilla-nspr-4.32-33.6.1, mozilla-nss-3.68-47.16.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): mozilla-nspr-4.32-33.6.1, mozilla-nss-3.68-47.16.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): mozilla-nspr-4.32-33.6.1, mozilla-nss-3.68-47.16.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): mozilla-nspr-4.32-33.6.1, mozilla-nss-3.68-47.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:3665-1: An update that contains security fixes and contains one feature can now be installed. Category: security (low) Bug References: 1029961,1185132,1189363 CVE References: JIRA References: SLE-21057 Sources used: openSUSE Leap 15.3 (src): drbd-utils-9.18.0-4.7.2
SUSE-SU-2021:3665-1: An update that contains security fixes and contains one feature can now be installed. Category: security (low) Bug References: 1029961,1185132,1189363 CVE References: JIRA References: SLE-21057 Sources used: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 (src): drbd-utils-9.18.0-4.7.2 SUSE Linux Enterprise High Availability 15-SP3 (src): drbd-utils-9.18.0-4.7.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1029961) was mentioned in https://build.opensuse.org/request/show/931965 15.3 / permissions
openSUSE-SU-2021:1520-1: An update that solves three vulnerabilities and has 27 fixes is now available. Category: security (moderate) Bug References: 1028975,1029961,1093414,1133678,1148788,1150345,1150366,1151190,1157498,1160285,1160764,1161335,1161779,1163588,1167163,1169614,1171164,1171173,1171569,1171580,1171686,1171879,1171882,1173221,1174504,1175720,1175867,1178475,1178476,1183669 CVE References: CVE-2019-3687,CVE-2019-3688,CVE-2020-8013 JIRA References: Sources used: openSUSE Leap 15.3 (src): permissions-20200127-lp153.24.3.1
openSUSE-RU-2021:3891-1: An update that has three recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1113013,1187654 CVE References: JIRA References: SLE-20016 Sources used: openSUSE Leap 15.3 (src): keyutils-1.6.3-5.6.1
SUSE-RU-2021:3891-1: An update that has three recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1113013,1187654 CVE References: JIRA References: SLE-20016 Sources used: SUSE MicroOS 5.1 (src): keyutils-1.6.3-5.6.1 SUSE MicroOS 5.0 (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Server for SAP 15 (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Server 15-LTSS (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): keyutils-1.6.3-5.6.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): keyutils-1.6.3-5.6.1 SUSE Enterprise Storage 6 (src): keyutils-1.6.3-5.6.1 SUSE CaaS Platform 4.0 (src): keyutils-1.6.3-5.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:1546-1: An update that has three recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1113013,1187654 CVE References: JIRA References: SLE-20016 Sources used: openSUSE Leap 15.2 (src): keyutils-1.6.3-lp152.6.6.1
SUSE-RU-2022:0055-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1160414,1178490,1182653 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): rsyslog-8.2106.0-4.13.1 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): rsyslog-8.2106.0-4.13.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): librdkafka-0.11.6-1.8.1, rsyslog-8.2106.0-4.13.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): librdkafka-0.11.6-1.8.1, rsyslog-8.2106.0-4.13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2022:0055-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1160414,1178490,1182653 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): librdkafka-0.11.6-1.8.1, rsyslog-8.2106.0-4.13.1
SUSE-RU-2022:0318-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): wicked-0.6.68-38.45.1 SUSE OpenStack Cloud 8 (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): wicked-0.6.68-38.45.1 HPE Helion Openstack 8 (src): wicked-0.6.68-38.45.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2022:0315-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE Linux Enterprise Server 12-SP5 (src): wicked-0.6.68-3.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2022:0345-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE Linux Enterprise Server for SAP 15-SP1 (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): wicked-0.6.68-3.24.1 SUSE Enterprise Storage 6 (src): wicked-0.6.68-3.24.1 SUSE CaaS Platform 4.0 (src): wicked-0.6.68-3.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2022:0346-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE Manager Server 4.1 (src): wicked-0.6.68-3.8.1 SUSE Manager Retail Branch Server 4.1 (src): wicked-0.6.68-3.8.1 SUSE Manager Proxy 4.1 (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Micro 5.0 (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): wicked-0.6.68-3.8.1 SUSE Enterprise Storage 7 (src): wicked-0.6.68-3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2022:0055-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1029961,1160414,1178490,1182653,1195650 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): librdkafka-0.11.6-1.8.1, rsyslog-8.2106.0-4.13.1 openSUSE Backports SLE-15-SP3 (src): audacity-2.2.2-bp153.3.3.1
SUSE-SU-2022:1548-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1029961,1120610,1130496,1181131 CVE References: CVE-2018-20482,CVE-2019-9923,CVE-2021-20193 JIRA References: Sources used: openSUSE Leap 15.3 (src): tar-1.34-150000.3.12.1 SUSE Linux Enterprise Realtime Extension 15-SP2 (src): tar-1.34-150000.3.12.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): tar-1.34-150000.3.12.1 SUSE Linux Enterprise Micro 5.2 (src): tar-1.34-150000.3.12.1 SUSE Linux Enterprise Micro 5.1 (src): tar-1.34-150000.3.12.1 SUSE Linux Enterprise Micro 5.0 (src): tar-1.34-150000.3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4253-1: An update that fixes 28 vulnerabilities is now available. Category: security (important) Bug References: 1029961,1064976,1064978,1069412,1099260,1099263,1102912,1121426,1121428,1184522,1191514,1192869,914660,951562,970662,970663,991940 CVE References: CVE-2011-5325,CVE-2014-9645,CVE-2015-9261,CVE-2016-2147,CVE-2016-2148,CVE-2016-6301,CVE-2017-15873,CVE-2017-15874,CVE-2017-16544,CVE-2018-1000500,CVE-2018-1000517,CVE-2018-20679,CVE-2019-5747,CVE-2021-28831,CVE-2021-42373,CVE-2021-42374,CVE-2021-42375,CVE-2021-42376,CVE-2021-42377,CVE-2021-42378,CVE-2021-42379,CVE-2021-42380,CVE-2021-42381,CVE-2021-42382,CVE-2021-42383,CVE-2021-42384,CVE-2021-42385,CVE-2021-42386 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): busybox-1.35.0-4.3.1 SUSE OpenStack Cloud 9 (src): busybox-1.35.0-4.3.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): busybox-1.35.0-4.3.1 SUSE Linux Enterprise Server 12-SP5 (src): busybox-1.35.0-4.3.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): busybox-1.35.0-4.3.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): busybox-1.35.0-4.3.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): busybox-1.35.0-4.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2023:4711-1: An update that has one fix can now be installed. Category: recommended (moderate) Bug References: 1029961 Sources used: openSUSE Leap 15.4 (src): wireless-regdb-20230901-150000.3.17.1 openSUSE Leap 15.5 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Micro 5.5 (src): wireless-regdb-20230901-150000.3.17.1 Basesystem Module 15-SP4 (src): wireless-regdb-20230901-150000.3.17.1 Basesystem Module 15-SP5 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Manager Proxy 4.2 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Manager Retail Branch Server 4.2 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Manager Server 4.2 (src): wireless-regdb-20230901-150000.3.17.1 SUSE Enterprise Storage 7.1 (src): wireless-regdb-20230901-150000.3.17.1 SUSE CaaS Platform 4.0 (src): wireless-regdb-20230901-150000.3.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2024:0011-1: An update that contains three features and has four fixes can now be installed. Category: recommended (moderate) Bug References: 1029961, 1158830, 1206798, 1209122 Jira References: PED-3144, PED-3244, PED-6369 Sources used: openSUSE Leap Micro 5.3 (src): procps-3.3.17-150000.7.37.1 openSUSE Leap Micro 5.4 (src): procps-3.3.17-150000.7.37.1 openSUSE Leap 15.4 (src): procps-3.3.17-150000.7.37.1 openSUSE Leap 15.5 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro 5.3 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro 5.4 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro 5.5 (src): procps-3.3.17-150000.7.37.1 Basesystem Module 15-SP4 (src): procps-3.3.17-150000.7.37.1 Basesystem Module 15-SP5 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): procps-3.3.17-150000.7.37.1 SUSE Enterprise Storage 7.1 (src): procps-3.3.17-150000.7.37.1 SUSE CaaS Platform 4.0 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro 5.1 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro 5.2 (src): procps-3.3.17-150000.7.37.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): procps-3.3.17-150000.7.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.