Bug 1132154 - zypper provides kernel-default-base as upgrade for kernel-default
zypper provides kernel-default-base as upgrade for kernel-default
Status: RESOLVED FIXED
: 1130270 (view as bug list)
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: libzypp
Leap 15.1
x86-64 SUSE Other
: P2 - High : Critical (vote)
: ---
Assigned To: E-mail List
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-04-11 01:34 UTC by Neil Rickert
Modified: 2022-12-23 11:28 UTC (History)
8 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Transcript of "zypper dup" session for update (793.57 KB, text/plain)
2019-04-11 01:38 UTC, Neil Rickert
Details
zypper solver test case (8.33 MB, application/x-xz)
2019-04-11 11:27 UTC, Jonathan Rivrain
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Neil Rickert 2019-04-11 01:34:22 UTC
User-Agent:       Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Build Identifier: 

I updated a Leap 15.1(Beta) system today.  And, after the update, it would not boot.  I have managed to repair it.  It turns out to be a problem with kernel updating.

I have a total of 6 systems with Leap 15.1 installed.  Three of those are in VMs and three are physical machines.  All have been updated to todays release (Build447.1).

The latest kernel in the repos is 4.12.14-lp151.23.5

After today's update, 4 of those 6 systems were running 4.12.14-lp151.23.3 which means that the kernel failed to update.

The other two of those systems finished up with kernel-default-base-lp151.23.5 and with no kernel-default package.  The system that failed to boot was one of those two.  That machine is using an encrypted LVM, and apparently the modules needed for crypto are not available in kernel-default-base.  The other system with kernel-default-base is not using disk encryption, and it managed to boot successfully.

To repair the broken system, I installed kernel-default from the repos.  The only conflict shown was with kernel-default-base (which it removed).

The two machines where "kernel-default-base" replaced the kernel were recently installed (Build 441.4).  Before today's update, they would have had kernel 4.12.14-lp151.23.4

I'm setting severity to "critical" since this should never happen.

I have listed the component as base system, rather than kernel.  The kernel itself seems to be fine, but something is going wrong with updating.

Reproducible: Always
Comment 1 Neil Rickert 2019-04-11 01:38:53 UTC
Created attachment 802575 [details]
Transcript of  "zypper dup" session for update

This is the transcript of the update on the machine that failed to boot after the update.

If I had looked closely, I might have noticed that it was uninstalling the kernel.  But I wasn't expecting that, and did not look closely enough to see the problem.
Comment 2 Felix Miata 2019-04-11 07:38:34 UTC
My 12 year old UEFI iMac got kernel-default-lp151.23.5 today without issue. My Asus UEFI Kaby Lake host ab250 got it without issue yesterday.
Comment 3 Takashi Iwai 2019-04-11 09:24:16 UTC
I have no idea why kernel-default-base gets installed instead of kernel-default.  
Recently kernel-default-base was split from kernel packaging, and this is the likely cause.  But it's still puzzling why zypper took kernel-default-base.
Comment 4 Michal Suchanek 2019-04-11 11:15:19 UTC
If you can reproduce (ie go back to old kernel and zypper offers you kernel-default-base as upgrade) please provide output of the zypper command with --debug-solver option.
Comment 5 Michal Suchanek 2019-04-11 11:18:01 UTC
If we get some useful log please determine why zypper offer kernel-default-base as upgrade. We possibly need to adjust something in the packaging.
Comment 6 Jonathan Rivrain 2019-04-11 11:27:15 UTC
Created attachment 802660 [details]
zypper solver test case
Comment 7 Michael Andres 2019-04-11 12:02:37 UTC
> *** Load Testcase from '.'
> DUMP kernel-default-base {
> ==============================
> (25745)kernel-default-base-4.12.14-lp151.23.5.lp151.4.2.x86_64(repo-oss)
>  PROVIDES (12029){
>   kernel-default-4.12.14-lp151.23
>   kernel-default-base-srchash-b40158b3f99537b67be78600ec8d6400e4c19346
>   kernel-default == 4.12.14-lp151.23
>   kernel-default == 4.12.14-lp151.23.5
>   kernel-default(x86-64) == 4.12.14-lp151.23.5
>   kernel-default_x86_64 == 4.12.14-lp151.23
>   kernel-default-base == 4.12.14-lp151.23.5.lp151.4.2
>   kernel-default-base(x86-64) == 4.12.14-lp151.23.5.lp151.4.2
>  PREREQUIRES (8){
>  REQUIRES (8){
>  CONFLICTS (7){
>   kernel-default == 4.12.14-lp151.23
>  OBSOLETES (51){
>   kernel-default == 4.12.14-lp151.23.1
>   kernel-default == 4.12.14-lp151.23.2
>   kernel-default == 4.12.14-lp151.23.3
>   kernel-default == 4.12.14-lp151.23.4
>   kernel-default-base < 3.1
>  RECOMMENDS (1){

As you can see, kernel-default-base(-4.12.14-lp151.23.5.lp151.4.2.x86_64) obsoletes kernel-default( == 4.12.14-lp151.23.4). (and it also provides kernel-default).

By doing this, kernel-default-base claims to be an update candidate for kernel-default.
Comment 8 Michal Suchanek 2019-04-11 12:21:27 UTC
Thanks

This should not be a problem on Leap after next kernel update but is still an issue in Tumbleweed.

How does zypper select the upgrade?

Does not kernel-default also provide kernel-default?
Comment 9 Michal Suchanek 2019-04-11 12:32:38 UTC
right, and kernel-default-base has the additional rebuild count for -base so is always higher version.
Comment 10 Michal Suchanek 2019-04-11 12:57:10 UTC
If I weed out these:

>   kernel-default == 4.12.14-lp151.23
>   kernel-default == 4.12.14-lp151.23.5

will it suffice for zypper not consider this a candidate?

I will check the old -base packages but I think they do not have these.

We probably need to keep these:

These are obsolete-rebuilds to not cause file conflicts with different build of same kernel 

>  OBSOLETES (51){
>   kernel-default == 4.12.14-lp151.23.1
>   kernel-default == 4.12.14-lp151.23.2
>   kernel-default == 4.12.14-lp151.23.3
>   kernel-default == 4.12.14-lp151.23.4

This prevents installing kernel-default-base together with kernel-default
>  CONFLICTS (7){
>   kernel-default == 4.12.14-lp151.23

Given the possibility to have multiple builds of same kernel we probably want to prevent that bacause the modules not provided by -base might not load then.

But now we will need to transform the obsolete-rebuilds since we no longer provide kernel-default.
Comment 11 Michael Andres 2019-04-11 13:02:48 UTC
(In reply to Michal Suchanek from comment #8)
> How does zypper select the upgrade?
> 
> Does not kernel-default also provide kernel-default?

It's not the 'provides' in the first place, it's the 'obsoletes' that defines the update candidates. Among multiple update candidates the solver prefers the ones also providing the name.
Comment 12 Michael Andres 2019-04-11 13:04:54 UTC
.. if you don't provide 'kernel-default', the solver will try to stay with the 'kernel-default' package.
Comment 13 Michael Schröder 2019-04-11 13:42:06 UTC
Oh, the solver tries to stay with kernel-default anyway. This is also what the attached testcase shows for me:

alternative d8025d21  1 + kernel-default-4.12.14-lp151.23.5.x86_64@repo-oss
alternative d8025d21  2   kernel-default-base-4.12.14-lp151.23.5.lp151.4.2.x86_64@repo-oss

So the solver testcase does not match the bug report.

But here's the thing: it's an alternative. If there's a problem with kernel-default-4.12.14-lp151.23.5.x86_64 the solver will happily switch over to kernel-default-base. I don't know if this is want you wanted to achieve.

I'm not sure I see the point of those kernel-default obsoletes (having bug 1127155 in mind)
Comment 14 Michael Schröder 2019-04-11 13:45:10 UTC
I don't think kernel-default-base should pretend that it is kernel-default. What's the rationale here?
Comment 15 Michal Suchanek 2019-04-11 15:14:32 UTC
(In reply to Michael Schröder from comment #14)
> I don't think kernel-default-base should pretend that it is kernel-default.
> What's the rationale here?

It copies everything from kernel-default not explicitly filtered. Practically it *is* the default kernel. If you need a particular module you can depend on it.

(In reply to Michael Schröder from comment #13)
> 
> I'm not sure I see the point of those kernel-default obsoletes (having bug
> 1127155 in mind)

You need to avoid installing a kernel over previous build of the same kernel version because it is not guaranteed the files are identical between rebuilds.
Comment 16 Michael Schröder 2019-04-11 15:19:33 UTC
> You need to avoid installing a kernel over previous build of the same kernel 
> version because it is not guaranteed the files are identical between rebuilds.

Ok, but this is usually done with a conflicts and not an obsoletes. Obsoletes always means "newer" as well.
Comment 17 Michal Suchanek 2019-04-11 15:36:11 UTC
(In reply to Michael Schröder from comment #16)
> > You need to avoid installing a kernel over previous build of the same kernel 
> > version because it is not guaranteed the files are identical between rebuilds.
> 
> Ok, but this is usually done with a conflicts and not an obsoletes.
> Obsoletes always means "newer" as well.

It is only used for newer packages here. I am not sure why it was designed that way back then. Perhaps it avoids removing the old package before installing the new *and* the file conflicts due to different files.

Removing the kernel during upgrade is not very nice thing to do.
Comment 18 Jonathan Rivrain 2019-04-11 15:40:37 UTC
(In reply to Michael Schröder from comment #13)
I'm not sure what you meant by:
> So the solver testcase does not match the bug report.

So I'd rther precise that yes it does, just to avoid confusion:

/var/log/zypper.solverTestCase/y2log:2019-04-11 13:21:23 <1> linux-hh22(4898) [libsolv] PoolImpl.cc(logSat):125 job: drop orphaned kernel-default < 3.11
/var/log/zypper.solverTestCase/y2log:2019-04-11 13:21:23 <999> linux-hh22(4898) [zypp::solver] SATResolver.cc(SATSolutionToPool):239 SATSolutionToPool install returns U_Ts_(27147)kernel-default-base-4.12.14-lp151.23.5.lp151.4.2.x86_64(repo-oss), 1
/var/log/zypper.solverTestCase/y2log:2019-04-11 13:21:23 <999> linux-hh22(4898) [zypp::solver] SATResolver.cc(SATSolutionToPool):247 SATSolutionToPool remove returns I_Ts_(67578)kernel-default-4.12.14-lp151.23.4.x86_64(@System), 1
Comment 20 Michal Suchanek 2019-04-18 05:58:36 UTC
*** Bug 1130270 has been marked as a duplicate of this bug. ***
Comment 21 Michal Suchanek 2019-04-18 06:15:46 UTC
Should be fixed in 15.1 by now. TW should be fixed with 5.0.8.
Comment 23 Jonathan Rivrain 2019-05-15 10:35:24 UTC
I confirm that the updates for kernel-default are working normally for me now, on 15.1.
Comment 24 Neil Rickert 2019-05-15 12:59:40 UTC
Thanks for the quick action on this.  And yes, everything now seems to be working properly on both Leap 15.1 and Tumbleweed.  I think this can be set to FIXED.
Comment 29 Swamp Workflow Management 2019-07-09 13:32:24 UTC
This is an autogenerated message for OBS integration:
This bug (1132154) was mentioned in
https://build.opensuse.org/request/show/714223 15.0 / kernel-source
Comment 32 Swamp Workflow Management 2019-07-12 16:15:55 UTC
SUSE-SU-2019:1829-1: An update that solves 11 vulnerabilities and has 71 fixes is now available.

Category: security (important)
Bug References: 1051510,1071995,1088047,1094555,1098633,1106383,1106751,1109137,1114279,1119532,1120423,1124167,1127155,1128432,1128902,1128910,1131645,1132154,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1136157,1136598,1136922,1136935,1137103,1137194,1137429,1137625,1137728,1137884,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375,1138589,1138719,1139771,1139782,1139865,1140133,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-12380,CVE-2019-12456,CVE-2019-12614,CVE-2019-12818,CVE-2019-12819
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15 (src):    kernel-azure-4.12.14-5.33.1, kernel-source-azure-4.12.14-5.33.1, kernel-syms-azure-4.12.14-5.33.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    kernel-azure-4.12.14-5.33.1, kernel-source-azure-4.12.14-5.33.1, kernel-syms-azure-4.12.14-5.33.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Swamp Workflow Management 2019-07-15 19:24:22 UTC
SUSE-SU-2019:1855-1: An update that solves 12 vulnerabilities and has 73 fixes is now available.

Category: security (important)
Bug References: 1051510,1061840,1065600,1071995,1088047,1094555,1098633,1106383,1106751,1109137,1114279,1119532,1120423,1124167,1127155,1128432,1128902,1128910,1131645,1132154,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1136157,1136598,1136922,1136935,1137103,1137194,1137429,1137625,1137728,1137884,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375,1138589,1138719,1139751,1139771,1139782,1139865,1140133,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11478,CVE-2019-11599,CVE-2019-12380,CVE-2019-12456,CVE-2019-12614,CVE-2019-12818,CVE-2019-12819
Sources used:
SUSE Linux Enterprise Workstation Extension 15 (src):    kernel-default-4.12.14-150.27.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    kernel-default-4.12.14-150.27.1, kernel-docs-4.12.14-150.27.1, kernel-obs-qa-4.12.14-150.27.1
SUSE Linux Enterprise Module for Legacy Software 15 (src):    kernel-default-4.12.14-150.27.1
SUSE Linux Enterprise Module for Development Tools 15 (src):    kernel-docs-4.12.14-150.27.1, kernel-obs-build-4.12.14-150.27.1, kernel-source-4.12.14-150.27.1, kernel-syms-4.12.14-150.27.1, kernel-vanilla-4.12.14-150.27.1
SUSE Linux Enterprise Module for Basesystem 15 (src):    kernel-default-4.12.14-150.27.1, kernel-source-4.12.14-150.27.1, kernel-zfcpdump-4.12.14-150.27.1
SUSE Linux Enterprise High Availability 15 (src):    kernel-default-4.12.14-150.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 35 Swamp Workflow Management 2019-07-15 19:44:39 UTC
SUSE-SU-2019:1851-1: An update that solves 11 vulnerabilities and has 77 fixes is now available.

Category: security (important)
Bug References: 1051510,1061840,1065600,1071995,1088047,1094555,1098633,1106383,1106751,1109137,1114279,1119532,1120423,1124167,1127155,1128432,1128902,1128910,1132154,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1136157,1136811,1136922,1137103,1137194,1137221,1137366,1137429,1137625,1137728,1137884,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375,1138589,1138719,1139751,1139771,1139782,1139865,1140133,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140948,821419,945811
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11478,CVE-2019-11599,CVE-2019-12456,CVE-2019-12614,CVE-2019-12818,CVE-2019-12819
Sources used:
SUSE Linux Enterprise Live Patching 12-SP4 (src):    kgraft-patch-SLE12-SP4_Update_6-1-6.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 36 Swamp Workflow Management 2019-07-15 19:57:06 UTC
SUSE-SU-2019:1855-1: An update that solves 12 vulnerabilities and has 73 fixes is now available.

Category: security (important)
Bug References: 1051510,1061840,1065600,1071995,1088047,1094555,1098633,1106383,1106751,1109137,1114279,1119532,1120423,1124167,1127155,1128432,1128902,1128910,1131645,1132154,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1136157,1136598,1136922,1136935,1137103,1137194,1137429,1137625,1137728,1137884,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375,1138589,1138719,1139751,1139771,1139782,1139865,1140133,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11478,CVE-2019-11599,CVE-2019-12380,CVE-2019-12456,CVE-2019-12614,CVE-2019-12818,CVE-2019-12819
Sources used:
SUSE Linux Enterprise Workstation Extension 15 (src):    kernel-default-4.12.14-150.27.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    kernel-default-4.12.14-150.27.1, kernel-docs-4.12.14-150.27.1, kernel-obs-qa-4.12.14-150.27.1
SUSE Linux Enterprise Module for Live Patching 15 (src):    kernel-default-4.12.14-150.27.1, kernel-livepatch-SLE15_Update_12-1-1.5.1
SUSE Linux Enterprise Module for Legacy Software 15 (src):    kernel-default-4.12.14-150.27.1
SUSE Linux Enterprise Module for Development Tools 15 (src):    kernel-docs-4.12.14-150.27.1, kernel-obs-build-4.12.14-150.27.1, kernel-source-4.12.14-150.27.1, kernel-syms-4.12.14-150.27.1, kernel-vanilla-4.12.14-150.27.1
SUSE Linux Enterprise Module for Basesystem 15 (src):    kernel-default-4.12.14-150.27.1, kernel-source-4.12.14-150.27.1, kernel-zfcpdump-4.12.14-150.27.1
SUSE Linux Enterprise High Availability 15 (src):    kernel-default-4.12.14-150.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 37 Swamp Workflow Management 2019-07-15 20:17:02 UTC
SUSE-SU-2019:1851-1: An update that solves 11 vulnerabilities and has 77 fixes is now available.

Category: security (important)
Bug References: 1051510,1061840,1065600,1071995,1088047,1094555,1098633,1106383,1106751,1109137,1114279,1119532,1120423,1124167,1127155,1128432,1128902,1128910,1132154,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1136157,1136811,1136922,1137103,1137194,1137221,1137366,1137429,1137625,1137728,1137884,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375,1138589,1138719,1139751,1139771,1139782,1139865,1140133,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140948,821419,945811
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11478,CVE-2019-11599,CVE-2019-12456,CVE-2019-12614,CVE-2019-12818,CVE-2019-12819
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.24.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.24.1, kernel-obs-build-4.12.14-95.24.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.24.1, kernel-source-4.12.14-95.24.1, kernel-syms-4.12.14-95.24.1
SUSE Linux Enterprise Live Patching 12-SP4 (src):    kgraft-patch-SLE12-SP4_Update_6-1-6.5.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.24.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.24.1, kernel-source-4.12.14-95.24.1, kernel-syms-4.12.14-95.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Swamp Workflow Management 2019-07-19 10:17:58 UTC
openSUSE-SU-2019:1716-1: An update that solves 7 vulnerabilities and has 45 fixes is now available.

Category: security (important)
Bug References: 1051510,1071995,1088047,1094555,1098633,1106383,1106751,1109137,1114279,1119532,1120423,1124167,1127155,1128902,1128910,1131645,1132154,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1136157,1136935,1137103,1137194,1137625,1137728,1137884,1138589,1138719,1139771,1139782,1139865,1140133,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-12614
Sources used:
openSUSE Leap 15.0 (src):    kernel-debug-4.12.14-lp150.12.67.1, kernel-default-4.12.14-lp150.12.67.1, kernel-docs-4.12.14-lp150.12.67.1, kernel-kvmsmall-4.12.14-lp150.12.67.1, kernel-obs-build-4.12.14-lp150.12.67.1, kernel-obs-qa-4.12.14-lp150.12.67.1, kernel-source-4.12.14-lp150.12.67.1, kernel-syms-4.12.14-lp150.12.67.1, kernel-vanilla-4.12.14-lp150.12.67.1
Comment 40 Swamp Workflow Management 2019-09-24 16:16:45 UTC
SUSE-SU-2019:2450-1: An update that solves 21 vulnerabilities and has 160 fixes is now available.

Category: security (important)
Bug References: 1012382,1051510,1053043,1055117,1061840,1065600,1065729,1068032,1071995,1083647,1083710,1088047,1094555,1098633,1102247,1106383,1106751,1109137,1111666,11123080,1112824,1113722,1114279,1115688,1117158,1118139,1119222,1120423,1120566,1124167,1124503,1127034,1127155,1127315,1128432,1128902,1128910,1129770,1130972,1132154,1132390,1133021,1133401,1133738,1134097,1134303,1134390,1134393,1134395,1134399,1134671,1135296,1135335,1135556,1135642,1135661,1136157,1136424,1136598,1136811,1136896,1136922,1136935,1136990,1137103,1137162,1137194,1137366,1137372,1137429,1137444,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137739,1137752,1137811,1137827,1137884,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375,1138589,1138719,1139358,1139751,1139771,1139782,1139865,1140133,1140139,1140322,1140328,1140405,1140424,1140428,1140575,1140577,1140637,1140652,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141401,1141402,1141452,1141453,1141454,1141478,1141488,1142023,1142112,1142220,1142221,1142265,1142350,1142351,1142354,1142359,1142450,1142701,1142868,1143003,1143045,1143105,1143185,1143189,1143191,1143507
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2018-20855,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-1125,CVE-2019-11477,CVE-2019-11478,CVE-2019-11599,CVE-2019-11810,CVE-2019-12380,CVE-2019-12456,CVE-2019-12614,CVE-2019-12818,CVE-2019-12819,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284,CVE-2019-3846
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP4 (src):    kernel-rt-4.12.14-8.3.1, kernel-rt_debug-4.12.14-8.3.1, kernel-source-rt-4.12.14-8.3.1, kernel-syms-rt-4.12.14-8.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 42 Swamp Workflow Management 2019-10-23 19:26:37 UTC
SUSE-SU-2019:2756-1: An update that solves 44 vulnerabilities and has 368 fixes is now available.

Category: security (important)
Bug References: 1012382,1047238,1050911,1051510,1053043,1054914,1055117,1056686,1060662,1061840,1061843,1064597,1064701,1065600,1065729,1066369,1071009,1071306,1071995,1078248,1082555,1083647,1083710,1085030,1085536,1085539,1086103,1087092,1088047,1090734,1091171,1093205,1094555,1098633,1102097,1102247,1104902,1104967,1106061,1106284,1106383,1106434,1106751,1108382,1109137,1109158,1111666,1112178,1112894,1112899,1112902,1112903,1112905,1112906,1112907,1113722,1114279,1114542,1115688,1117158,1118139,1118689,1119086,1119222,1119532,1120423,1120566,1120876,1120902,1120937,1123034,1123080,1123105,1123959,1124167,1124370,1124503,1127034,1127155,1127315,1127988,1128432,1128902,1128910,1129424,1129519,1129664,1129770,1130972,1131107,1131281,1131304,1131565,1132154,1132390,1132686,1133021,1133401,1134097,1134291,1134303,1134390,1134671,1134881,1134882,1135219,1135296,1135335,1135556,1135642,1135661,1135897,1136157,1136261,1136811,1136896,1136935,1136990,1137069,1137162,1137221,1137366,1137372,1137429,1137444,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137739,1137752,1137811,1137827,1137865,1137884,1137959,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138374,1138375,1138539,1138589,1138719,1139020,1139021,1139101,1139500,1139771,1139782,1139865,1140012,1140133,1140139,1140155,1140322,1140328,1140405,1140424,1140426,1140428,1140487,1140637,1140652,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141013,1141401,1141402,1141450,1141452,1141453,1141454,1141478,1141543,1141554,1142019,1142076,1142109,1142112,1142117,1142118,1142119,1142129,1142220,1142221,1142350,1142351,1142354,1142359,1142450,1142496,1142541,1142635,1142685,1142701,1142857,1142868,1143003,1143105,1143185,1143300,1143466,1143507,1143765,1143841,1143843,1144123,1144333,1144474,1144518,1144718,1144813,1144880,1144886,1144912,1144920,1144979,1145010,1145024,1145051,1145059,1145189,1145235,1145300,1145302,1145388,1145389,1145390,1145391,1145392,1145393,1145394,1145395,1145396,1145397,1145408,1145409,1145661,1145678,1145687,1145920,1145922,1145934,1145937,1145940,1145941,1145942,1146042,1146074,1146084,1146163,1146285,1146346,1146351,1146352,1146361,1146376,1146378,1146381,1146391,1146399,1146413,1146425,1146512,1146514,1146516,1146519,1146524,1146526,1146529,1146531,1146540,1146543,1146547,1146550,1146575,1146589,1146664,1146678,1146938,1148031,1148032,1148033,1148034,1148035,1148093,1148133,1148192,1148196,1148198,1148202,1148303,1148363,1148379,1148394,1148527,1148574,1148616,1148617,1148619,1148698,1148712,1148859,1148868,1149053,1149083,1149104,1149105,1149106,1149197,1149214,1149224,1149313,1149325,1149376,1149413,1149418,1149424,1149446,1149522,1149527,1149539,1149552,1149555,1149591,1149602,1149612,1149626,1149651,1149652,1149713,1149940,1149959,1149963,1149976,1150025,1150033,1150112,1150381,1150423,1150562,1150727,1150860,1150861,1150933,1151350,1151610,1151667,1151671,1151891,1151955,1152024,1152025,1152026,1152161,1152325,1152457,1152460,1152466,1152972,1152974,1152975
CVE References: CVE-2017-18551,CVE-2017-18595,CVE-2018-20976,CVE-2018-21008,CVE-2019-10207,CVE-2019-11479,CVE-2019-14814,CVE-2019-14815,CVE-2019-14816,CVE-2019-14821,CVE-2019-14835,CVE-2019-15030,CVE-2019-15031,CVE-2019-15090,CVE-2019-15098,CVE-2019-15117,CVE-2019-15118,CVE-2019-15211,CVE-2019-15212,CVE-2019-15214,CVE-2019-15215,CVE-2019-15216,CVE-2019-15217,CVE-2019-15218,CVE-2019-15219,CVE-2019-15220,CVE-2019-15221,CVE-2019-15222,CVE-2019-15239,CVE-2019-15290,CVE-2019-15291,CVE-2019-15292,CVE-2019-15538,CVE-2019-15666,CVE-2019-15902,CVE-2019-15917,CVE-2019-15919,CVE-2019-15920,CVE-2019-15921,CVE-2019-15924,CVE-2019-15926,CVE-2019-15927,CVE-2019-9456,CVE-2019-9506
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP4 (src):    kernel-rt-4.12.14-8.6.1, kernel-rt_debug-4.12.14-8.6.1, kernel-source-rt-4.12.14-8.6.1, kernel-syms-rt-4.12.14-8.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.