Revision Date: | 2021-05-13 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509). - CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208). - CVE-2021-29155: Fixed an issue within kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations (bnc#1184942). - CVE-2020-36310: Fixed an issue in arch/x86/kvm/svm/svm.c that allowed a set_memory_region_test infinite loop for certain nested page faults (bnc#1184512). - CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583). - CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391). - CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181). - CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181). - CVE-2020-36311: Fixed an issue in arch/x86/kvm/svm/sev.c that allowed attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions) (bnc#1184511). - CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211). - CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211). - CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120). - CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393). - CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397). - CVE-2021-28964: Fixed a race condition in fs/btrfs/ctree.c that could have caused a denial of service because of a lack of locking on an extent buffer before a cloning operation (bnc#1184193). - CVE-2021-3444: Fixed the bpf verifier as it did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution (bnc#1184170). - CVE-2021-28971: Fixed a potential local denial of service in intel_pmu_drain_pebs_nhm where userspace applications can cause a system crash because the PEBS status in a PEBS record is mishandled (bnc#1184196). - CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646). - CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167). - CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168). - CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198). - CVE-2021-29647: Fixed an issue in kernel qrtr_recvmsg in net/qrtr/qrtr.c that allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bnc#1184192). - CVE-2020-27171: Fixed an issue in kernel/bpf/verifier.c that had an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bnc#1183686, bnc#1183775). - CVE-2020-27170: Fixed an issue in kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. This affects pointer types that do not define a ptr_limit (bnc#1183686 bnc#1183775). - CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593). - CVE-2020-35519: Update patch reference for x25 fix (bsc#1183696). - CVE-2021-3428: Fixed ext4 integer overflow in ext4_es_cache_extent (bsc#1173485, bsc#1183509). - CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720). - CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069). - CVE-2020-27815: Fixed jfs array index bounds check in dbAdjTree (bsc#1179454). - CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715). - CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716). - CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
The following non-security bugs were fixed:
- Revert 'rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)' This turned out to be a bad idea: the kernel-$flavor-devel package must be usable without kernel-$flavor, e.g. at the build of a KMP. And this change brought superfluous installation of kernel-preempt when a system had kernel-syms (bsc#1185113). - Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). - bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). - bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775). - coredump: fix crash when umh is disabled (bsc#1177753, bsc#1182194). - dm: fix redundant IO accounting for bios that need splitting (bsc#1183738). - ext4: check journal inode extents more carefully (bsc#1173485). - ext4: do not allow overlapping system zones (bsc#1173485). - ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485). - handle also the opposite type of race condition - hv: clear ring_buffer pointer during cleanup (part of ae6935ed) (bsc#1181032). - hv_netvsc: remove ndo_poll_controller (bsc#1185248). - ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922). - ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997). - ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140). - ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes). - ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes). - ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes). - ibmvnic: enhance resetting status check during module exit (bsc#1065729). - ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes). - ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293). - ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes). - ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes). - macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). - post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388). - powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293). - rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063). - rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439) - rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244) - rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650) - xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1040855 1044767 1047233 1061305 1065729 1094840 1118087 1134856 1149792 1152457 1152497 1154448 1154456 1154458 1154461 1155945 1159352 1159812 1170643 1171078 1171550 1173274 1173485 1175873 1176410 1176700 1176720 1176855 1177143 1177411 1177753 1178181 1178666 1178667 1178668 1179454 1181032 1181960 1182194 1182672 1182715 1182716 1182717 1183022 1183063 1183069 1183509 1183593 1183646 1183686 1183696 1183738 1183775 1184120 1184167 1184168 1184170 1184192 1184193 1184194 1184196 1184198 1184208 1184211 1184388 1184391 1184393 1184397 1184509 1184511 1184512 1184514 1184583 1184650 1184942 1185113 1185244 1185248 CVE-2010-0405 CVE-2011-0421 CVE-2011-1831 CVE-2011-1832 CVE-2011-1833 CVE-2011-1834 CVE-2011-1835 CVE-2011-1836 CVE-2011-1837 CVE-2011-2721 CVE-2011-3627 CVE-2012-1162 CVE-2012-1163 CVE-2012-1457 CVE-2012-1458 CVE-2012-1459 CVE-2012-6706 CVE-2013-2126 CVE-2013-2127 CVE-2013-6497 CVE-2014-9050 CVE-2014-9328 CVE-2015-0247 CVE-2015-1191 CVE-2015-1461 CVE-2015-1462 CVE-2015-1463 CVE-2015-1572 CVE-2015-2170 CVE-2015-2221 CVE-2015-2222 CVE-2015-2305 CVE-2015-2668 CVE-2017-14988 CVE-2017-7261 CVE-2017-7294 CVE-2017-7346 CVE-2018-12207 CVE-2018-16868 CVE-2019-11135 CVE-2019-16775 CVE-2019-16776 CVE-2019-16777 CVE-2019-18420 CVE-2019-18421 CVE-2019-18424 CVE-2019-18425 CVE-2020-0433 CVE-2020-13249 CVE-2020-14422 CVE-2020-25219 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 CVE-2020-25694 CVE-2020-25695 CVE-2020-25696 CVE-2020-26154 CVE-2020-27170 CVE-2020-27171 CVE-2020-27673 CVE-2020-27815 CVE-2020-35519 CVE-2020-36310 CVE-2020-36311 CVE-2020-36312 CVE-2020-36322 CVE-2020-3899 CVE-2021-20219 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038 CVE-2021-28660 CVE-2021-28688 CVE-2021-28950 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29154 CVE-2021-29155 CVE-2021-29264 CVE-2021-29265 CVE-2021-29647 CVE-2021-29650 CVE-2021-30002 CVE-2021-3428 CVE-2021-3444 CVE-2021-3483 SUSE-SU-2019:1351-2 SUSE-SU-2019:2043-1 SUSE-SU-2019:2960-1 SUSE-SU-2020:0104-1 SUSE-SU-2020:1198-1 SUSE-SU-2020:1423-1 SUSE-SU-2020:1822-1 SUSE-SU-2020:2901-1 SUSE-SU-2020:3425-1 SUSE-SU-2021:1596-1
|
Platform(s): | openSUSE Leap 15.0 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 12 SUSE Linux Enterprise Desktop 12 SP1 SUSE Linux Enterprise Desktop 12 SP2 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise Desktop 12 SP4 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1 SUSE Linux Enterprise Module for Server Applications 15 SUSE Linux Enterprise Module for Server Applications 15 SP1 SUSE Linux Enterprise Module for Web Scripting 15 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP1-LTSS SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server for SAP Applications 12 SP4 SUSE Linux Enterprise Server for SAP Applications 15 SUSE Linux Enterprise Workstation Extension 15 SP2 SUSE OpenStack Cloud 6 SUSE OpenStack Cloud 7 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
dbus-1-glib-0.108-lp150.1 is installed
OR dbus-1-glib-tool-0.108-lp150.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP2 is installed
AND bogofilter-1.1.1-174.27 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP3 is installed
AND Package Information
libQtWebKit4-4.6.3-5.34 is installed
OR libQtWebKit4-32bit-4.6.3-5.34 is installed
OR libqt4-4.6.3-5.34 is installed
OR libqt4-32bit-4.6.3-5.34 is installed
OR libqt4-qt3support-4.6.3-5.34 is installed
OR libqt4-qt3support-32bit-4.6.3-5.34 is installed
OR libqt4-sql-4.6.3-5.34 is installed
OR libqt4-sql-32bit-4.6.3-5.34 is installed
OR libqt4-sql-mysql-4.6.3-5.34 is installed
OR libqt4-sql-mysql-32bit-4.6.3-5.34 is installed
OR libqt4-sql-postgresql-4.6.3-5.34 is installed
OR libqt4-sql-postgresql-32bit-4.6.3-5.34 is installed
OR libqt4-sql-sqlite-4.6.3-5.34 is installed
OR libqt4-sql-sqlite-32bit-4.6.3-5.34 is installed
OR libqt4-sql-unixODBC-4.6.3-5.34 is installed
OR libqt4-sql-unixODBC-32bit-4.6.3-5.34 is installed
OR libqt4-x11-4.6.3-5.34 is installed
OR libqt4-x11-32bit-4.6.3-5.34 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed
AND libzip2-0.11.1-4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP1 is installed
AND Package Information
ecryptfs-utils-103-5 is installed
OR ecryptfs-utils-32bit-103-5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed
AND libraw9-0.15.4-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND clamav-0.99.2-32 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP4 is installed
AND Package Information
bzip2-1.0.6-29 is installed
OR libbz2-1-1.0.6-29 is installed
OR libbz2-1-32bit-1.0.6-29 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1 is installed
AND Package Information
gnutls-3.6.7-6.11 is installed
OR gnutls-guile-3.6.7-6.11 is installed
OR libgnutls-devel-32bit-3.6.7-6.11 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Server Applications 15 is installed
AND Package Information
xen-4.10.4_06-3.25 is installed
OR xen-devel-4.10.4_06-3.25 is installed
OR xen-tools-4.10.4_06-3.25 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Server Applications 15 SP1 is installed
AND Package Information
libmariadb-devel-3.1.8-3.18 is installed
OR libmariadb_plugins-3.1.8-3.18 is installed
OR mariadb-connector-c-3.1.8-3.18 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Web Scripting 15 is installed
AND Package Information
nodejs10-10.18.0-1.15 is installed
OR nodejs10-devel-10.18.0-1.15 is installed
OR nodejs10-docs-10.18.0-1.15 is installed
OR npm10-10.18.0-1.15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND Package Information
java-1_8_0-openjdk-1.8.0.65-1 is installed
OR java-1_8_0-openjdk-demo-1.8.0.65-1 is installed
OR java-1_8_0-openjdk-devel-1.8.0.65-1 is installed
OR java-1_8_0-openjdk-headless-1.8.0.65-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND Package Information
xen-4.5.5_14-22.25 is installed
OR xen-doc-html-4.5.5_14-22.25 is installed
OR xen-kmp-default-4.5.5_14_k3.12.74_60.64.54-22.25 is installed
OR xen-libs-4.5.5_14-22.25 is installed
OR xen-libs-32bit-4.5.5_14-22.25 is installed
OR xen-tools-4.5.5_14-22.25 is installed
OR xen-tools-domU-4.5.5_14-22.25 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
avahi-0.6.32-30 is installed
OR avahi-lang-0.6.32-30 is installed
OR avahi-utils-0.6.32-30 is installed
OR libavahi-client3-0.6.32-30 is installed
OR libavahi-client3-32bit-0.6.32-30 is installed
OR libavahi-common3-0.6.32-30 is installed
OR libavahi-common3-32bit-0.6.32-30 is installed
OR libavahi-core7-0.6.32-30 is installed
OR libdns_sd-0.6.32-30 is installed
OR libdns_sd-32bit-0.6.32-30 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND Package Information
java-1_8_0-openjdk-1.8.0.212-27.32 is installed
OR java-1_8_0-openjdk-demo-1.8.0.212-27.32 is installed
OR java-1_8_0-openjdk-devel-1.8.0.212-27.32 is installed
OR java-1_8_0-openjdk-headless-1.8.0.212-27.32 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
java-1_7_0-openjdk-1.7.0.181-43.15 is installed
OR java-1_7_0-openjdk-demo-1.7.0.181-43.15 is installed
OR java-1_7_0-openjdk-devel-1.7.0.181-43.15 is installed
OR java-1_7_0-openjdk-headless-1.7.0.181-43.15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND Package Information
kgraft-patch-4_4_114-92_67-default-9-2 is installed
OR kgraft-patch-SLE12-SP2_Update_19-9-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
accountsservice-0.6.42-14 is installed
OR accountsservice-lang-0.6.42-14 is installed
OR libaccountsservice0-0.6.42-14 is installed
OR typelib-1_0-AccountsService-1_0-0.6.42-14 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
ghostscript-9.27-23.28 is installed
OR ghostscript-x11-9.27-23.28 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
libjpeg-turbo-1.5.3-31.19 is installed
OR libjpeg62-62.2.0-31.19 is installed
OR libjpeg62-32bit-62.2.0-31.19 is installed
OR libjpeg62-turbo-1.5.3-31.19 is installed
OR libjpeg8-8.1.2-31.19 is installed
OR libjpeg8-32bit-8.1.2-31.19 is installed
OR libturbojpeg0-8.1.2-31.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
libsolv-0.6.36-2.16 is installed
OR libsolv-tools-0.6.36-2.16 is installed
OR libzypp-16.20.0-2.39 is installed
OR perl-solv-0.6.36-2.16 is installed
OR python-solv-0.6.36-2.16 is installed
OR zypper-1.13.51-21.26 is installed
OR zypper-log-1.13.51-21.26 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
hostinfo-1.0.1-19.5 is installed
OR supportutils-3.0-95.21 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND dnsmasq-2.78-18.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 15-LTSS is installed
AND Package Information
libpython3_6m1_0-3.6.10-3.56 is installed
OR python3-3.6.10-3.56 is installed
OR python3-base-3.6.10-3.56 is installed
OR python3-curses-3.6.10-3.56 is installed
OR python3-dbm-3.6.10-3.56 is installed
OR python3-devel-3.6.10-3.56 is installed
OR python3-idle-3.6.10-3.56 is installed
OR python3-tk-3.6.10-3.56 is installed
OR python3-tools-3.6.10-3.56 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 12 SP4 is installed
AND Package Information
kernel-default-4.12.14-95.74.1 is installed
OR kernel-default-base-4.12.14-95.74.1 is installed
OR kernel-default-devel-4.12.14-95.74.1 is installed
OR kernel-devel-4.12.14-95.74.1 is installed
OR kernel-macros-4.12.14-95.74.1 is installed
OR kernel-source-4.12.14-95.74.1 is installed
OR kernel-syms-4.12.14-95.74.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 15 is installed
AND Package Information
libjavascriptcoregtk-4_0-18-2.28.2-3.54 is installed
OR libwebkit2gtk-4_0-37-2.28.2-3.54 is installed
OR libwebkit2gtk3-lang-2.28.2-3.54 is installed
OR webkit2gtk-4_0-injected-bundles-2.28.2-3.54 is installed
OR webkit2gtk3-2.28.2-3.54 is installed
OR webkit2gtk3-devel-2.28.2-3.54 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 15 SP2 is installed
AND Package Information
libproxy-plugins-0.4.15-4.3 is installed
OR libproxy1-config-gnome3-0.4.15-4.3 is installed
OR libproxy1-networkmanager-0.4.15-4.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 6 is installed
AND python-Pillow-2.7.0-1 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 7 is installed
AND Package Information
openstack-aodh-3.0.4~a0~dev1-2.3 is installed
OR openstack-aodh-api-3.0.4~a0~dev1-2.3 is installed
OR openstack-aodh-doc-3.0.4~a0~dev1-2.3 is installed
OR openstack-aodh-evaluator-3.0.4~a0~dev1-2.3 is installed
OR openstack-aodh-expirer-3.0.4~a0~dev1-2.3 is installed
OR openstack-aodh-listener-3.0.4~a0~dev1-2.3 is installed
OR openstack-aodh-notifier-3.0.4~a0~dev1-2.3 is installed
OR python-aodh-3.0.4~a0~dev1-2.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND Package Information
libseccomp-2.4.1-11.3 is installed
OR libseccomp2-2.4.1-11.3 is installed
OR libseccomp2-32bit-2.4.1-11.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
libvirt-3.3.0-5.40 is installed
OR libvirt-admin-3.3.0-5.40 is installed
OR libvirt-client-3.3.0-5.40 is installed
OR libvirt-daemon-3.3.0-5.40 is installed
OR libvirt-daemon-config-network-3.3.0-5.40 is installed
OR libvirt-daemon-config-nwfilter-3.3.0-5.40 is installed
OR libvirt-daemon-driver-interface-3.3.0-5.40 is installed
OR libvirt-daemon-driver-libxl-3.3.0-5.40 is installed
OR libvirt-daemon-driver-lxc-3.3.0-5.40 is installed
OR libvirt-daemon-driver-network-3.3.0-5.40 is installed
OR libvirt-daemon-driver-nodedev-3.3.0-5.40 is installed
OR libvirt-daemon-driver-nwfilter-3.3.0-5.40 is installed
OR libvirt-daemon-driver-qemu-3.3.0-5.40 is installed
OR libvirt-daemon-driver-secret-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-core-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-disk-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-iscsi-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-logical-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-mpath-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-rbd-3.3.0-5.40 is installed
OR libvirt-daemon-driver-storage-scsi-3.3.0-5.40 is installed
OR libvirt-daemon-hooks-3.3.0-5.40 is installed
OR libvirt-daemon-lxc-3.3.0-5.40 is installed
OR libvirt-daemon-qemu-3.3.0-5.40 is installed
OR libvirt-daemon-xen-3.3.0-5.40 is installed
OR libvirt-doc-3.3.0-5.40 is installed
OR libvirt-libs-3.3.0-5.40 is installed
OR libvirt-lock-sanlock-3.3.0-5.40 is installed
OR libvirt-nss-3.3.0-5.40 is installed
|