|
Bugzilla – Full Text Bug Listing |
| Summary: | exec '/usr/lib/zypp/notify-message' (Keine Berechtigung) nicht möglich. | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Distribution | Reporter: | Ulrich Windl <Ulrich.Windl> |
| Component: | libzypp | Assignee: | E-mail List <zypp-maintainers> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | jlopez, zypp-maintainers |
| Version: | Leap 42.2 | ||
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | openSUSE 42.2 | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Ulrich Windl
2017-09-14 21:34:03 UTC
I forgot: # rpm -qf /usr/lib/zypp/notify-message libzypp-16.15.2-5.9.1.x86_64 ### "rpm -V libzypp" verifies OK For libzypp maintainers: It seems that the script /usr/lib/zypp/notify-message should be executable but it has not executable bit. Is there any reason for that? Yes. It's a discontinued legacy feature. I'll fix the error message. Legacy script removed in libzypp-16.17.1 SUSE-RU-2017:3164-1: An update that has 11 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047233,1053671,1057188,1057634,1058695,1058783,1059065,1061384,1062561,1064999,661410 CVE References: Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): libsolv-0.6.30-2.5.2, libzypp-16.17.4-2.15.2 SUSE Linux Enterprise Server 12-SP3 (src): libsolv-0.6.30-2.5.2, libzypp-16.17.4-2.15.2, zypper-1.13.38-21.10.3 SUSE Linux Enterprise Desktop 12-SP3 (src): libsolv-0.6.30-2.5.2, libzypp-16.17.4-2.15.2, zypper-1.13.38-21.10.3 SUSE Container as a Service Platform ALL (src): libsolv-0.6.30-2.5.2, libzypp-16.17.4-2.15.2, zypper-1.13.38-21.10.3 openSUSE-RU-2017:3191-1: An update that has 11 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047233,1053671,1057188,1057634,1058695,1058783,1059065,1061384,1062561,1064999,661410 CVE References: Sources used: openSUSE Leap 42.3 (src): libsolv-0.6.30-3.1, libzypp-16.17.4-15.1, zypper-1.13.38-11.1 SUSE-RU-2018:0021-1: An update that has 16 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1035946,1036002,1047233,1053671,1057188,1057634,1057640,1058695,1058783,1062561,1064999,1067605,1068708,1071466,661410,969569 CVE References: Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): libsolv-0.6.30-2.27.10.11, libzypp-16.17.7-27.39.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): libsolv-0.6.30-2.27.10.11, libzypp-16.17.7-27.39.1, zypper-1.13.39-18.25.6 SUSE Linux Enterprise Server 12-SP2 (src): libsolv-0.6.30-2.27.10.11, libzypp-16.17.7-27.39.1, zypper-1.13.39-18.25.6 SUSE Linux Enterprise Desktop 12-SP2 (src): libsolv-0.6.30-2.27.10.11, libzypp-16.17.7-27.39.1, zypper-1.13.39-18.25.6 OpenStack Cloud Magnum Orchestration 7 (src): libsolv-0.6.30-2.27.10.11, libzypp-16.17.7-27.39.1, zypper-1.13.39-18.25.6 openSUSE-RU-2018:0033-1: An update that has 16 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1035946,1036002,1047233,1053671,1057188,1057634,1057640,1058695,1058783,1062561,1064999,1067605,1068708,1071466,661410,969569 CVE References: Sources used: openSUSE Leap 42.2 (src): libsolv-0.6.30-5.6.1, libzypp-16.17.7-5.15.1, zypper-1.13.39-5.15.1 SUSE-SU-2018:0053-1: An update that solves 29 vulnerabilities and has 57 fixes is now available. Category: security (moderate) Bug References: 1003846,1004995,1009966,1022404,1025282,1025891,1026567,1029907,1029908,1029909,1029995,1030623,1035386,1036619,1039099,1039276,1039513,1040800,1040968,1041090,1043059,1043590,1043883,1043966,1044016,1045472,1045522,1045732,1047178,1047233,1048605,1048861,1050152,1050258,1050487,1052503,1052507,1052509,1052511,1052514,1052518,1053137,1053347,1053595,1053671,1055446,1055641,1055825,1056058,1056312,1056381,1057007,1057139,1057144,1057149,1057188,1057634,1057721,1057724,1058480,1058695,1058783,1059050,1059065,1059075,1059292,1059723,1060599,1060621,1061241,1061384,1062561,1063249,1063269,1064571,1064999,1065363,1066242,1066371,1066500,1066611,1067891,1070878,1070958,1071905,1071906 CVE References: CVE-2014-3710,CVE-2014-8116,CVE-2014-8117,CVE-2014-9620,CVE-2014-9621,CVE-2014-9653,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-12837,CVE-2017-12883,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-3735,CVE-2017-3736,CVE-2017-3737,CVE-2017-3738,CVE-2017-6512 Sources used: SUSE CaaS Platform ALL (src): sles12-caasp-dex-image-2.0.0-3.3.11, sles12-dnsmasq-nanny-image-2.0.1-2.3.15, sles12-haproxy-image-2.0.1-2.3.16, sles12-kubedns-image-2.0.1-2.3.11, sles12-mariadb-image-2.0.1-2.3.15, sles12-openldap-image-2.0.0-2.3.11, sles12-pause-image-2.0.1-2.3.9, sles12-pv-recycler-node-image-2.0.1-2.3.10, sles12-salt-api-image-2.0.1-2.3.10, sles12-salt-master-image-2.0.1-2.3.10, sles12-salt-minion-image-2.0.1-2.3.14, sles12-sidecar-image-2.0.1-2.3.11, sles12-tiller-image-2.0.0-2.3.11, sles12-velum-image-2.0.1-2.3.13 |