Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for MozillaFirefox, mozilla-nss, mozilla-nspr, java-1_8_0-openjdk (Important) |
Description: |
Mozilla Firefox was updated to the Firefox ESR release 45.9.
Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.
Security issues fixed in Firefox (bsc#1035082)
- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code - MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 - MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing - MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing - MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library - MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2 - MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor - MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling - MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions - MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection - MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation - MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel - MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection - MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor - MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data - MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing - MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content - MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content - MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes - MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding - MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing - MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events - MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL
Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:
- Update to NSS 3.29.5: * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed. * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed. * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499). * requires NSPR >= 4.13.1
- Update to NSS 3.29.3
* enables TLS 1.3 by default
- Fixed a bug in hash computation (and build with GCC 7 which complains about shifts of boolean values). (bsc#1030071, bmo#1348767)
- Update to NSS 3.28.3
This is a patch release to fix binary compatibility issues.
- Update to NSS 3.28.1
This is a patch release to update the list of root CA certificates.
* The following CA certificates were Removed
CN = Buypass Class 2 CA 1 CN = Root CA Generalitat Valenciana OU = RSA Security 2048 V3
* The following CA certificates were Added
OU = AC RAIZ FNMT-RCM CN = Amazon Root CA 1 CN = Amazon Root CA 2 CN = Amazon Root CA 3 CN = Amazon Root CA 4 CN = LuxTrust Global Root 2 CN = Symantec Class 1 Public Primary Certification Authority - G4 CN = Symantec Class 1 Public Primary Certification Authority - G6 CN = Symantec Class 2 Public Primary Certification Authority - G4 CN = Symantec Class 2 Public Primary Certification Authority - G6
* The version number of the updated root CA list has been set to 2.11
- Update to NSS 3.28
New functionality:
* NSS includes support for TLS 1.3 draft -18. This includes a number of improvements to TLS 1.3:
- The signed certificate timestamp, used in certificate transparency, is supported in TLS 1.3. - Key exporters for TLS 1.3 are supported. This includes the early key exporter, which can be used if 0-RTT is enabled. Note that there is a difference between TLS 1.3 and key exporters in older versions of TLS. TLS 1.3 does not distinguish between an empty context and no context. - The TLS 1.3 (draft) protocol can be enabled, by defining NSS_ENABLE_TLS_1_3=1 when building NSS. - NSS includes support for the X25519 key exchange algorithm, which is supported and enabled by default in all versions of TLS.
Notable Changes:
* NSS can no longer be compiled with support for additional elliptic curves. This was previously possible by replacing certain NSS source files. * NSS will now detect the presence of tokens that support additional elliptic curves and enable those curves for use in TLS. Note that this detection has a one-off performance cost, which can be avoided by using the SSL_NamedGroupConfig function to limit supported groups to those that NSS provides. * PKCS#11 bypass for TLS is no longer supported and has been removed. * Support for 'export' grade SSL/TLS cipher suites has been removed. * NSS now uses the signature schemes definition in TLS 1.3. This also affects TLS 1.2. NSS will now only generate signatures with the combinations of hash and signature scheme that are defined in TLS 1.3, even when negotiating TLS 1.2.
- This means that SHA-256 will only be used with P-256 ECDSA certificates, SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates. SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward compatibility reasons. - NSS will now no longer assume that default signature schemes are supported by a peer if there was no commonly supported signature scheme.
* NSS will now check if RSA-PSS signing is supported by the token that holds the private key prior to using it for TLS. * The certificate validation code contains checks to no longer trust certificates that are issued by old WoSign and StartCom CAs after October 21, 2016. This is equivalent to the behavior that Mozilla will release with Firefox 51.
- Update to NSS 3.27.2 * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)
- raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)
- Update to NSS 3.26.2
New Functionality:
* the selfserv test utility has been enhanced to support ALPN (HTTP/1.1) and 0-RTT * added support for the System-wide crypto policy available on Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation of NSS without the libpkix library
Notable Changes:
* The following CA certificate was Added CN = ISRG Root X1 * NPN is disabled and ALPN is enabled by default * the NSS test suite now completes with the experimental TLS 1.3 code enabled * several test improvements and additions, including a NIST known answer test
Changes in 3.26.2 * MD5 signature algorithms sent by the server in CertificateRequest messages are now properly ignored. Previously, with rare server configurations, an MD5 signature algorithm might have been selected for client authentication and caused the client to abort the connection soon after.
- Update to NSS 3.25
New functionality:
* Implemented DHE key agreement for TLS 1.3 * Added support for ChaCha with TLS 1.3 * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF * In previous versions, when using client authentication with TLS 1.2, NSS only supported certificate_verify messages that used the same signature hash algorithm as used by the PRF. This limitation has been removed.
Notable changes:
* An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3 * Regression fix: NSS no longer reports a failure if an application attempts to disable the SSLv2 protocol. * The list of trusted CA certificates has been updated to version 2.8 * The following CA certificate was Removed Sonera Class1 CA * The following CA certificates were Added Hellenic Academic and Research Institutions RootCA 2015 Hellenic Academic and Research Institutions ECC RootCA 2015 Certplus Root CA G1 Certplus Root CA G2 OpenTrust Root CA G1 OpenTrust Root CA G2 OpenTrust Root CA G3
- Update to NSS 3.24
New functionality:
* NSS softoken has been updated with the latest National Institute of Standards and Technology (NIST) guidance (as of 2015): - Software integrity checks and POST functions are executed on shared library load. These checks have been disabled by default, as they can cause a performance regression. To enable these checks, you must define symbol NSS_FORCE_FIPS when building NSS. - Counter mode and Galois/Counter Mode (GCM) have checks to prevent counter overflow. - Additional CSPs are zeroed in the code. - NSS softoken uses new guidance for how many Rabin-Miller tests are needed to verify a prime based on prime size. * NSS softoken has also been updated to allow NSS to run in FIPS Level 1 (no password). This mode is triggered by setting the database password to the empty string. In FIPS mode, you may move from Level 1 to Level 2 (by setting an appropriate password), but not the reverse. * A SSL_ConfigServerCert function has been added for configuring SSL/TLS server sockets with a certificate and private key. Use this new function in place of SSL_ConfigSecureServer, SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses, and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically determines the certificate type from the certificate and private key. The caller is no longer required to use SSLKEAType explicitly to select a 'slot' into which the certificate is configured (which incorrectly identifies a key agreement type rather than a certificate). Separate functions for configuring Online Certificate Status Protocol (OCSP) responses or Signed Certificate Timestamps are not needed, since these can be added to the optional SSLExtraServerCertData struct provided to SSL_ConfigServerCert. Also, partial support for RSA Probabilistic Signature Scheme (RSA-PSS) certificates has been added. Although these certificates can be configured, they will not be used by NSS in this version. * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo. Instead, applications should use the newly added attribute authType. * Add a shared library (libfreeblpriv3) on Linux platforms that define FREEBL_LOWHASH. * Remove most code related to SSL v2, including the ability to actively send a SSLv2-compatible client hello. However, the server-side implementation of the SSL/TLS protocol still supports processing of received v2-compatible client hello messages. * Disable (by default) NSS support in optimized builds for logging SSL/TLS key material to a logfile if the SSLKEYLOGFILE environment variable is set. To enable the functionality in optimized builds, you must define the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS. * Update NSS to protect it against the Cachebleed attack. * Disable support for DTLS compression. * Improve support for TLS 1.3. This includes support for DTLS 1.3. Note that TLS 1.3 support is experimental and not suitable for production use.
- Update to NSS 3.23
New functionality:
* ChaCha20/Poly1305 cipher and TLS cipher suites now supported * Experimental-only support TLS 1.3 1-RTT mode (draft-11). This code is not ready for production use.
Notable changes:
* The list of TLS extensions sent in the TLS handshake has been reordered to increase compatibility of the Extended Master Secret with with servers * The build time environment variable NSS_ENABLE_ZLIB has been renamed to NSS_SSL_ENABLE_ZLIB * The build time environment variable NSS_DISABLE_CHACHAPOLY was added, which can be used to prevent compilation of the ChaCha20/Poly1305 code. * The following CA certificates were Removed
- Staat der Nederlanden Root CA - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado - NetLock Kozjegyzoi (Class A) Tanusitvanykiado - NetLock Uzleti (Class B) Tanusitvanykiado - NetLock Expressz (Class C) Tanusitvanykiado - VeriSign Class 1 Public PCA - G2 - VeriSign Class 3 Public PCA - VeriSign Class 3 Public PCA - G2 - CA Disig
* The following CA certificates were Added
+ SZAFIR ROOT CA2 + Certum Trusted Network CA 2
* The following CA certificate had the Email trust bit turned on
+ Actalis Authentication Root CA
Security fixes: * CVE-2016-2834: Memory safety bugs (boo#983639) MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037
* - Update to NSS 3.22.3 * Increase compatibility of TLS extended master secret, don't send an empty TLS extension last in the handshake (bmo#1243641) * Fixed a heap-based buffer overflow related to the parsing of certain ASN.1 structures. An attacker could create a specially-crafted certificate which, when parsed by NSS, would cause a crash or execution of arbitrary code with the permissions of the user. (CVE-2016-1950, bmo#1245528)
- Update to NSS 3.22.2
New functionality:
* RSA-PSS signatures are now supported (bmo#1215295) * Pseudorandom functions based on hashes other than SHA-1 are now supported * Enforce an External Policy on NSS from a config file (bmo#1009429)
- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)
Mozilla NSPR was updated to version 4.13.1:
The previously released version 4.13 had changed pipes to be nonblocking by default, and as a consequence, PollEvent was changed to not block on clear. The NSPR development team received reports that these changes caused regressions in some applications that use NSPR, and it has been decided to revert the changes made in NSPR 4.13. NSPR 4.13.1 restores the traditional behavior of pipes and PollEvent.
Mozilla NSPR update to version 4.13 had these changes:
- PL_strcmp (and others) were fixed to return consistent results when one of the arguments is NULL. - PollEvent was fixed to not block on clear. - Pipes are always nonblocking. - PR_GetNameForIdentity: added thread safety lock and bound checks. - Removed the PLArena freelist. - Avoid some integer overflows. - fixed several comments.
This update also contains java-1_8_0-openjdk that needed to be rebuilt against the new mozilla-nss version.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1015499 1015547 1021636 1026102 1030071 1035082 1041216 1046303 1050244 1051510 1051858 1061599 1061840 1065600 1065729 1071995 1083647 1085030 1086301 1086313 1086314 1088810 1103989 1103990 1103991 1104353 1104427 1104745 1105392 1107116 1107121 1109837 1111666 1112178 1112374 1112504 1113956 1114279 1114648 1114685 1118661 1123328 1123823 1123828 1123832 1124493 1126206 1127371 1127611 1127682 1129551 1129991 1132826 1133021 1133147 1133291 1134973 1135715 1137001 1140025 1141493 1141798 1141844 1142685 1143959 1144333 1151910 1151927 1152763 1153535 1153917 1153921 1154243 1154601 1155331 1155334 1156259 1156286 1156402 1156609 1157155 1157157 1157424 1157480 1157692 1157853 1157966 1158013 1158021 1158026 1158071 1158763 1158819 1159028 1159096 1159271 1159297 1159377 1159394 1159483 1159484 1159500 1159569 1159588 1159841 1159908 1159909 1159910 1159911 1159955 1160147 1160195 1160210 1160211 1160218 1160433 1160442 1160469 1160470 1160476 1160560 1160618 1160678 1160755 1160756 1160784 1160787 1160802 1160803 1160804 1160917 1160966 1160979 1161087 1161243 1161360 1161472 1161514 1161518 1161522 1161523 1161549 1161552 1161674 1161702 1161875 1161907 1161931 1161933 1161934 1161935 1161936 1161937 1162028 1162067 1162109 1162139 1162171 1162557 1162617 1162618 1162619 1162623 1162928 1162943 1163206 1163383 1163384 1163762 1163774 1163836 1163840 1163841 1163842 1163843 1163844 1163845 1163846 1163849 1163850 1163851 1163852 1163853 1163855 1163856 1163857 1163858 1163859 1163860 1163861 1163862 1163863 1163867 1163869 1163880 1164069 1164098 1164314 1164315 1164471 1172265 854443 983639 CVE-2013-7038 CVE-2013-7039 CVE-2016-1950 CVE-2016-2834 CVE-2016-8635 CVE-2016-9574 CVE-2017-12652 CVE-2017-5429 CVE-2017-5432 CVE-2017-5433 CVE-2017-5434 CVE-2017-5435 CVE-2017-5436 CVE-2017-5437 CVE-2017-5438 CVE-2017-5439 CVE-2017-5440 CVE-2017-5441 CVE-2017-5442 CVE-2017-5443 CVE-2017-5444 CVE-2017-5445 CVE-2017-5446 CVE-2017-5447 CVE-2017-5448 CVE-2017-5459 CVE-2017-5460 CVE-2017-5461 CVE-2017-5462 CVE-2017-5464 CVE-2017-5465 CVE-2017-5469 CVE-2017-9103 CVE-2017-9104 CVE-2017-9105 CVE-2017-9106 CVE-2017-9107 CVE-2017-9108 CVE-2017-9109 CVE-2018-16428 CVE-2018-16429 CVE-2018-20748 CVE-2018-20749 CVE-2018-20750 CVE-2019-12450 CVE-2019-13616 CVE-2019-14615 CVE-2019-14896 CVE-2019-14897 CVE-2019-16994 CVE-2019-18808 CVE-2019-18900 CVE-2019-19036 CVE-2019-19045 CVE-2019-19054 CVE-2019-19318 CVE-2019-19319 CVE-2019-19447 CVE-2019-19767 CVE-2019-19927 CVE-2019-19965 CVE-2019-19966 CVE-2019-20054 CVE-2019-20095 CVE-2019-20096 CVE-2019-2201 CVE-2019-2614 CVE-2019-2627 CVE-2019-2737 CVE-2019-2739 CVE-2019-2740 CVE-2019-2805 CVE-2019-3695 CVE-2019-3696 CVE-2019-3820 CVE-2019-6237 CVE-2019-8571 CVE-2019-8583 CVE-2019-8584 CVE-2019-8586 CVE-2019-8587 CVE-2019-8594 CVE-2019-8595 CVE-2019-8596 CVE-2019-8597 CVE-2019-8601 CVE-2019-8607 CVE-2019-8608 CVE-2019-8609 CVE-2019-8610 CVE-2019-8611 CVE-2019-8615 CVE-2019-8619 CVE-2019-8622 CVE-2019-8623 CVE-2020-7053 CVE-2020-8428 CVE-2020-8648 CVE-2020-8992 SUSE-SU-2017:1248-1 SUSE-SU-2017:1576-1 SUSE-SU-2019:0313-1 SUSE-SU-2019:1390-1 SUSE-SU-2019:1722-1 SUSE-SU-2019:1850-1 SUSE-SU-2019:2687-1 SUSE-SU-2019:2972-1 SUSE-SU-2020:0079-1 SUSE-SU-2020:0356-1 SUSE-SU-2020:0580-1 SUSE-SU-2020:0911-1 SUSE-SU-2020:1612-1 SUSE-SU-2020:3030-1
|
Platform(s): | openSUSE Leap 42.1 openSUSE Leap 42.2 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 12 SUSE Linux Enterprise Desktop 12 SP1 SUSE Linux Enterprise Desktop 12 SP2 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise High Availability Extension 11 SP2 SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 11 SP1-LTSS SUSE Linux Enterprise Server 11 SP1-TERADATA SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS SUSE Linux Enterprise Server 11 SP3-LTSS SUSE Linux Enterprise Server 11 SP4 SUSE Linux Enterprise Server 11-SECURITY SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP1-LTSS SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 SUSE Linux Enterprise Server for SAP Applications 11 SUSE Linux Enterprise Server for SAP Applications 11 SP1-LTSS SUSE Linux Enterprise Server for SAP Applications 11 SP1-TERADATA SUSE Linux Enterprise Server for SAP Applications 11 SP3 SUSE Linux Enterprise Server for SAP Applications 11 SP3-CLIENT-TOOLS SUSE Linux Enterprise Server for SAP Applications 11 SP3-LTSS SUSE Linux Enterprise Server for SAP Applications 11 SP4 SUSE Linux Enterprise Server for SAP Applications 11-SECURITY SUSE Linux Enterprise Server for SAP Applications 12 SUSE Linux Enterprise Server for SAP Applications 12 SP1 SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS SUSE Linux Enterprise Server for SAP Applications 12 SP2 SUSE Linux Enterprise Server for SAP Applications 12 SP2-BCL SUSE Linux Enterprise Server for SAP Applications 12 SP2-ESPOS SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS SUSE Linux Enterprise Server for SAP Applications 12-LTSS SUSE Linux Enterprise Server for VMWare 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP4 SUSE Linux Enterprise Software Development Kit 12 SP2 SUSE Linux Enterprise Software Development Kit 12 SP4 SUSE Linux Enterprise Software Development Kit 12 SP5 SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Workstation Extension 12 SP1 SUSE Linux Enterprise Workstation Extension 12 SP2 SUSE Linux Enterprise Workstation Extension 12 SP3 SUSE Linux Enterprise Workstation Extension 12 SP4 SUSE Package Hub for SUSE Linux Enterprise 12 SUSE Package Hub for SUSE Linux Enterprise 12 SP2
| Product(s): | |
Definition Synopsis |
openSUSE Leap 42.1 is installed AND Package Information
openssh-6.6p1-14.1 is installed
OR openssh-askpass-gnome-6.6p1-14.1 is installed
OR openssh-cavs-6.6p1-14.1 is installed
OR openssh-fips-6.6p1-14.1 is installed
OR openssh-helpers-6.6p1-14.1 is installed
|
Definition Synopsis |
openSUSE Leap 42.2 is installed
AND Package Information
apache2-2.4.23-4.3 is installed
OR apache2-devel-2.4.23-4.3 is installed
OR apache2-doc-2.4.23-4.3 is installed
OR apache2-example-pages-2.4.23-4.3 is installed
OR apache2-prefork-2.4.23-4.3 is installed
OR apache2-utils-2.4.23-4.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP2 is installed
AND Package Information
acroread-9.5.5-0.5.5 is installed
OR acroread-cmaps-9.4.6-0.4.5 is installed
OR acroread-fonts-ja-9.4.6-0.4.5 is installed
OR acroread-fonts-ko-9.4.6-0.4.5 is installed
OR acroread-fonts-zh_CN-9.4.6-0.4.5 is installed
OR acroread-fonts-zh_TW-9.4.6-0.4.5 is installed
OR acroread_ja-9.4.2-0.4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP3 is installed
AND libaugeas0-0.9.0-3.15.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed
AND Package Information
gimp-2.8.10-1.164 is installed
OR gimp-lang-2.8.10-1.164 is installed
OR gimp-plugins-python-2.8.10-1.164 is installed
OR libgimp-2_0-0-2.8.10-1.164 is installed
OR libgimpui-2_0-0-2.8.10-1.164 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP1 is installed
AND autofs-5.0.9-8.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed
AND Package Information
bzip2-1.0.6-29.2 is installed
OR libbz2-1-1.0.6-29.2 is installed
OR libbz2-1-32bit-1.0.6-29.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND Package Information
aaa_base-13.2+git20140911.61c1681-36.1 is installed
OR aaa_base-extras-13.2+git20140911.61c1681-36.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability Extension 11 SP2 is installed
AND Package Information
hawk-0.5.2-0.38 is installed
OR hawk-templates-0.5.2-0.38 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 is installed
AND
freetype2-2.3.7-25.9 is installed
OR freetype2-32bit-2.3.7-25.9 is installed
OR freetype2-x86-2.3.7-25.9 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 is installed
AND
freetype2-2.3.7-25.9 is installed
OR freetype2-32bit-2.3.7-25.9 is installed
OR freetype2-x86-2.3.7-25.9 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1 is installed
AND kvm-0.12.5-1.20 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP1-LTSS is installed
AND kvm-0.12.5-1.20 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP1-TERADATA is installed
AND kvm-0.12.5-1.20 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-LTSS is installed
AND kvm-0.12.5-1.20 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-TERADATA is installed
AND kvm-0.12.5-1.20 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1 is installed
AND
MozillaFirefox-10.0.6-0.4 is installed
OR MozillaFirefox-branding-SLED-7-0.6.7 is installed
OR MozillaFirefox-translations-10.0.6-0.4 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP1-TERADATA is installed
AND
MozillaFirefox-10.0.6-0.4 is installed
OR MozillaFirefox-branding-SLED-7-0.6.7 is installed
OR MozillaFirefox-translations-10.0.6-0.4 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP2 is installed
AND
MozillaFirefox-10.0.6-0.4 is installed
OR MozillaFirefox-branding-SLED-7-0.6.7 is installed
OR MozillaFirefox-translations-10.0.6-0.4 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-TERADATA is installed
AND
MozillaFirefox-10.0.6-0.4 is installed
OR MozillaFirefox-branding-SLED-7-0.6.7 is installed
OR MozillaFirefox-translations-10.0.6-0.4 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1 is installed
AND libzip1-0.9-1.24 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP1-TERADATA is installed
AND libzip1-0.9-1.24 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-TERADATA is installed
AND libzip1-0.9-1.24 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP1 is installed
AND Package Information
curl-7.19.0-11.24 is installed
OR libcurl4-7.19.0-11.24 is installed
OR libcurl4-32bit-7.19.0-11.24 is installed
OR libcurl4-x86-7.19.0-11.24 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1-LTSS is installed
AND
bind-9.6ESVR11W1-0.6 is installed
OR bind-chrootenv-9.6ESVR11W1-0.6 is installed
OR bind-devel-9.6ESVR11W1-0.6 is installed
OR bind-doc-9.6ESVR11W1-0.6 is installed
OR bind-libs-9.6ESVR11W1-0.6 is installed
OR bind-libs-32bit-9.6ESVR11W1-0.6 is installed
OR bind-utils-9.6ESVR11W1-0.6 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP1-TERADATA is installed
AND
bind-9.6ESVR11W1-0.6 is installed
OR bind-chrootenv-9.6ESVR11W1-0.6 is installed
OR bind-devel-9.6ESVR11W1-0.6 is installed
OR bind-doc-9.6ESVR11W1-0.6 is installed
OR bind-libs-9.6ESVR11W1-0.6 is installed
OR bind-libs-32bit-9.6ESVR11W1-0.6 is installed
OR bind-utils-9.6ESVR11W1-0.6 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-LTSS is installed
AND
bind-9.6ESVR11W1-0.6 is installed
OR bind-chrootenv-9.6ESVR11W1-0.6 is installed
OR bind-devel-9.6ESVR11W1-0.6 is installed
OR bind-doc-9.6ESVR11W1-0.6 is installed
OR bind-libs-9.6ESVR11W1-0.6 is installed
OR bind-libs-32bit-9.6ESVR11W1-0.6 is installed
OR bind-utils-9.6ESVR11W1-0.6 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-TERADATA is installed
AND
bind-9.6ESVR11W1-0.6 is installed
OR bind-chrootenv-9.6ESVR11W1-0.6 is installed
OR bind-devel-9.6ESVR11W1-0.6 is installed
OR bind-doc-9.6ESVR11W1-0.6 is installed
OR bind-libs-9.6ESVR11W1-0.6 is installed
OR bind-libs-32bit-9.6ESVR11W1-0.6 is installed
OR bind-utils-9.6ESVR11W1-0.6 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1-TERADATA is installed
AND
libpulse-browse0-0.9.21-1.16 is installed
OR libpulse-mainloop-glib0-0.9.21-1.16 is installed
OR libpulse0-0.9.21-1.16 is installed
OR libpulse0-32bit-0.9.21-1.16 is installed
OR pulseaudio-0.9.21-1.16 is installed
OR pulseaudio-esound-compat-0.9.21-1.16 is installed
OR pulseaudio-gdm-hooks-0.9.21-1.16 is installed
OR pulseaudio-lang-0.9.21-1.16 is installed
OR pulseaudio-module-x11-0.9.21-1.16 is installed
OR pulseaudio-module-zeroconf-0.9.21-1.16 is installed
OR pulseaudio-utils-0.9.21-1.16 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP1-TERADATA is installed
AND
libpulse-browse0-0.9.21-1.16 is installed
OR libpulse-mainloop-glib0-0.9.21-1.16 is installed
OR libpulse0-0.9.21-1.16 is installed
OR libpulse0-32bit-0.9.21-1.16 is installed
OR pulseaudio-0.9.21-1.16 is installed
OR pulseaudio-esound-compat-0.9.21-1.16 is installed
OR pulseaudio-gdm-hooks-0.9.21-1.16 is installed
OR pulseaudio-lang-0.9.21-1.16 is installed
OR pulseaudio-module-x11-0.9.21-1.16 is installed
OR pulseaudio-module-zeroconf-0.9.21-1.16 is installed
OR pulseaudio-utils-0.9.21-1.16 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP2 is installed
AND aaa_base-11-6.65 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP3 is installed
AND mutt-1.5.17-42.37 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed
AND mutt-1.5.17-42.37 is installed
OR Package Information
SUSE Linux Enterprise Server for VMWare 11 SP3 is installed
AND mutt-1.5.17-42.37 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3 is installed
AND cron-4.1-194.207 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed
AND
cobbler-2.2.2-0.68.3 is installed
OR koan-2.2.2-0.68.3 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP3-CLIENT-TOOLS is installed
AND
cobbler-2.2.2-0.68.3 is installed
OR koan-2.2.2-0.68.3 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP3-LTSS is installed
AND
kernel-bigsmp-3.0.101-0.47.102 is installed
OR kernel-bigsmp-base-3.0.101-0.47.102 is installed
OR kernel-bigsmp-devel-3.0.101-0.47.102 is installed
OR kernel-default-3.0.101-0.47.102 is installed
OR kernel-default-base-3.0.101-0.47.102 is installed
OR kernel-default-devel-3.0.101-0.47.102 is installed
OR kernel-default-man-3.0.101-0.47.102 is installed
OR kernel-ec2-3.0.101-0.47.102 is installed
OR kernel-ec2-base-3.0.101-0.47.102 is installed
OR kernel-ec2-devel-3.0.101-0.47.102 is installed
OR kernel-pae-3.0.101-0.47.102 is installed
OR kernel-pae-base-3.0.101-0.47.102 is installed
OR kernel-pae-devel-3.0.101-0.47.102 is installed
OR kernel-source-3.0.101-0.47.102 is installed
OR kernel-syms-3.0.101-0.47.102 is installed
OR kernel-trace-3.0.101-0.47.102 is installed
OR kernel-trace-base-3.0.101-0.47.102 is installed
OR kernel-trace-devel-3.0.101-0.47.102 is installed
OR kernel-xen-3.0.101-0.47.102 is installed
OR kernel-xen-base-3.0.101-0.47.102 is installed
OR kernel-xen-devel-3.0.101-0.47.102 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP3-LTSS is installed
AND
kernel-bigsmp-3.0.101-0.47.102 is installed
OR kernel-bigsmp-base-3.0.101-0.47.102 is installed
OR kernel-bigsmp-devel-3.0.101-0.47.102 is installed
OR kernel-default-3.0.101-0.47.102 is installed
OR kernel-default-base-3.0.101-0.47.102 is installed
OR kernel-default-devel-3.0.101-0.47.102 is installed
OR kernel-default-man-3.0.101-0.47.102 is installed
OR kernel-ec2-3.0.101-0.47.102 is installed
OR kernel-ec2-base-3.0.101-0.47.102 is installed
OR kernel-ec2-devel-3.0.101-0.47.102 is installed
OR kernel-pae-3.0.101-0.47.102 is installed
OR kernel-pae-base-3.0.101-0.47.102 is installed
OR kernel-pae-devel-3.0.101-0.47.102 is installed
OR kernel-source-3.0.101-0.47.102 is installed
OR kernel-syms-3.0.101-0.47.102 is installed
OR kernel-trace-3.0.101-0.47.102 is installed
OR kernel-trace-base-3.0.101-0.47.102 is installed
OR kernel-trace-devel-3.0.101-0.47.102 is installed
OR kernel-xen-3.0.101-0.47.102 is installed
OR kernel-xen-base-3.0.101-0.47.102 is installed
OR kernel-xen-devel-3.0.101-0.47.102 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP4 is installed
AND
ImageMagick-6.4.3.6-7.78.22 is installed
OR libMagickCore1-6.4.3.6-7.78.22 is installed
OR libMagickCore1-32bit-6.4.3.6-7.78.22 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed
AND
ImageMagick-6.4.3.6-7.78.22 is installed
OR libMagickCore1-6.4.3.6-7.78.22 is installed
OR libMagickCore1-32bit-6.4.3.6-7.78.22 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP4 is installed
AND Package Information
kde4-kgreeter-plugins-4.3.5-0.12.18 is installed
OR kdebase4-wallpapers-4.3.5-0.11.18 is installed
OR kdebase4-workspace-4.3.5-0.12.18 is installed
OR kdebase4-workspace-ksysguardd-4.3.5-0.12.18 is installed
OR kdm-4.3.5-0.12.18 is installed
OR kwin-4.3.5-0.12.18 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11-SECURITY is installed
AND
libopenssl1-devel-1.0.1g-0.35 is installed
OR libopenssl1_0_0-1.0.1g-0.35 is installed
OR libopenssl1_0_0-32bit-1.0.1g-0.35 is installed
OR libopenssl1_0_0-x86-1.0.1g-0.35 is installed
OR openssl1-1.0.1g-0.35 is installed
OR openssl1-doc-1.0.1g-0.35 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 11-SECURITY is installed
AND
libopenssl1-devel-1.0.1g-0.35 is installed
OR libopenssl1_0_0-1.0.1g-0.35 is installed
OR libopenssl1_0_0-32bit-1.0.1g-0.35 is installed
OR libopenssl1_0_0-x86-1.0.1g-0.35 is installed
OR openssl1-1.0.1g-0.35 is installed
OR openssl1-doc-1.0.1g-0.35 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11-SECURITY is installed
AND Package Information
libldap-openssl1-2_4-2-2.4.26-0.28 is installed
OR libldap-openssl1-2_4-2-32bit-2.4.26-0.28 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 is installed
AND
java-1_7_0-openjdk-1.7.0.75-11 is installed
OR java-1_7_0-openjdk-demo-1.7.0.75-11 is installed
OR java-1_7_0-openjdk-devel-1.7.0.75-11 is installed
OR java-1_7_0-openjdk-headless-1.7.0.75-11 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 is installed
AND
java-1_7_0-openjdk-1.7.0.75-11 is installed
OR java-1_7_0-openjdk-demo-1.7.0.75-11 is installed
OR java-1_7_0-openjdk-devel-1.7.0.75-11 is installed
OR java-1_7_0-openjdk-headless-1.7.0.75-11 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 is installed
AND Package Information
libXp6-1.0.2-3 is installed
OR libXp6-32bit-1.0.2-3 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP1 is installed
AND
fontconfig-2.11.0-6 is installed
OR fontconfig-32bit-2.11.0-6 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP1 is installed
AND
fontconfig-2.11.0-6 is installed
OR fontconfig-32bit-2.11.0-6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND apache2-mod_nss-1.0.8-13 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND clamav-0.99.2-32 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS is installed
AND clamav-0.99.2-32 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND Package Information
kgraft-patch-3_12_67-60_64_18-default-10-2.1 is installed
OR kgraft-patch-3_12_67-60_64_18-xen-10-2.1 is installed
OR kgraft-patch-SLE12-SP1_Update_9-10-2.1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP2 is installed
AND
ImageMagick-6.8.8.1-47 is installed
OR libMagickCore-6_Q16-1-6.8.8.1-47 is installed
OR libMagickWand-6_Q16-1-6.8.8.1-47 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP2 is installed
AND
ImageMagick-6.8.8.1-47 is installed
OR libMagickCore-6_Q16-1-6.8.8.1-47 is installed
OR libMagickWand-6_Q16-1-6.8.8.1-47 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
DirectFB-1.7.1-6 is installed
OR lib++dfb-1_7-1-1.7.1-6 is installed
OR libdirectfb-1_7-1-1.7.1-6 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND
MozillaFirefox-52.8.1esr-109.34 is installed
OR MozillaFirefox-devel-52.8.1esr-109.34 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP2-BCL is installed
AND
MozillaFirefox-52.8.1esr-109.34 is installed
OR MozillaFirefox-devel-52.8.1esr-109.34 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND
dovecot22-2.2.31-19.11 is installed
OR dovecot22-backend-mysql-2.2.31-19.11 is installed
OR dovecot22-backend-pgsql-2.2.31-19.11 is installed
OR dovecot22-backend-sqlite-2.2.31-19.11 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP2-ESPOS is installed
AND
dovecot22-2.2.31-19.11 is installed
OR dovecot22-backend-mysql-2.2.31-19.11 is installed
OR dovecot22-backend-pgsql-2.2.31-19.11 is installed
OR dovecot22-backend-sqlite-2.2.31-19.11 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND
kgraft-patch-4_4_74-92_38-default-9-2 is installed
OR kgraft-patch-SLE12-SP2_Update_13-9-2 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS is installed
AND
kgraft-patch-4_4_74-92_38-default-9-2 is installed
OR kgraft-patch-SLE12-SP2_Update_13-9-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
eog-3.20.4-7 is installed
OR eog-lang-3.20.4-7 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12-LTSS is installed
AND
xen-4.4.4_04-22.22 is installed
OR xen-doc-html-4.4.4_04-22.22 is installed
OR xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22 is installed
OR xen-libs-4.4.4_04-22.22 is installed
OR xen-libs-32bit-4.4.4_04-22.22 is installed
OR xen-tools-4.4.4_04-22.22 is installed
OR xen-tools-domU-4.4.4_04-22.22 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12-LTSS is installed
AND
xen-4.4.4_04-22.22 is installed
OR xen-doc-html-4.4.4_04-22.22 is installed
OR xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22 is installed
OR xen-libs-4.4.4_04-22.22 is installed
OR xen-libs-32bit-4.4.4_04-22.22 is installed
OR xen-tools-4.4.4_04-22.22 is installed
OR xen-tools-domU-4.4.4_04-22.22 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12-LTSS is installed
AND apache2-mod_nss-1.0.14-10.14.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
AND autofs-5.0.9-21 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed
AND Package Information
compat-openssl097g-0.9.7g-146.22.51.5 is installed
OR compat-openssl097g-32bit-0.9.7g-146.22.51.5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
AND Package Information
libgcrypt-devel-1.5.0-0.15 is installed
OR libgcrypt-devel-32bit-1.5.0-0.15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
AND Package Information
Mesa-devel-9.0.3-0.19 is installed
OR Mesa-devel-32bit-9.0.3-0.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
AND Package Information
ImageMagick-6.4.3.6-7.30 is installed
OR ImageMagick-devel-6.4.3.6-7.30 is installed
OR libMagick++-devel-6.4.3.6-7.30 is installed
OR libMagick++1-6.4.3.6-7.30 is installed
OR libMagickWand1-6.4.3.6-7.30 is installed
OR libMagickWand1-32bit-6.4.3.6-7.30 is installed
OR perl-PerlMagick-6.4.3.6-7.30 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
AND Package Information
MozillaFirefox-45.9.0esr-105 is installed
OR MozillaFirefox-devel-45.9.0esr-105 is installed
OR mozilla-nspr-4.13.1-18 is installed
OR mozilla-nspr-devel-4.13.1-18 is installed
OR mozilla-nss-3.29.5-57 is installed
OR mozilla-nss-devel-3.29.5-57 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
AND Package Information
gnome-shell-3.20.4-77.23 is installed
OR gnome-shell-devel-3.20.4-77.23 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP5 is installed
AND Package Information
libjpeg-turbo-1.5.3-31.19 is installed
OR libjpeg62-devel-62.2.0-31.19 is installed
OR libjpeg62-turbo-1.5.3-31.19 is installed
OR libjpeg8-devel-8.1.2-31.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 is installed
AND Package Information
flash-player-11.2.202.418-11.1 is installed
OR flash-player-gnome-11.2.202.418-11.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
AND Package Information
flash-player-11.2.202.637-143 is installed
OR flash-player-gnome-11.2.202.637-143 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
AND Package Information
libuuid-devel-2.28-44.3 is installed
OR util-linux-2.28-44.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP3 is installed
AND Package Information
NetworkManager-vpnc-1.0.8-8.4 is installed
OR NetworkManager-vpnc-gnome-1.0.8-8.4 is installed
OR NetworkManager-vpnc-lang-1.0.8-8.4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP4 is installed
AND Package Information
glib2-2.48.2-12.12 is installed
OR libgio-fam-2.48.2-12.12 is installed
|
Definition Synopsis |
SUSE Package Hub for SUSE Linux Enterprise 12 is installed
AND Package Information
chromedriver-53.0.2785.143-106 is installed
OR chromium-53.0.2785.143-106 is installed
OR chromium-desktop-gnome-53.0.2785.143-106 is installed
OR chromium-desktop-kde-53.0.2785.143-106 is installed
OR chromium-ffmpegsumo-53.0.2785.143-106 is installed
|
Definition Synopsis |
SUSE Package Hub for SUSE Linux Enterprise 12 SP2 is installed
AND Package Information
chromedriver-55.0.2883.75-2 is installed
OR chromium-55.0.2883.75-2 is installed
|