Revision Date: | 2022-06-20 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 12 SP5 kernel was updated.
The following security bugs were fixed:
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143) - CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144) - CVE-2022-1966: Fixed an use-after-free bug in the netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015) - CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266) - CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507). - CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577) - CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426) - CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063). - CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605) - CVE-2021-39711: In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1197219). - CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505). - CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
The following non-security bugs were fixed:
- ACPI: property: Release subnode properties with data nodes (git-fixes). - ARM: 9110/1: oabi-compat: fix oabi epoll sparse warning (bsc#1129770) - arm64: set plt* section addresses to 0x0 (git-fixes) - arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes) - arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (git-fixes) - arm64: avoid -Woverride-init warning (git-fixes) - arm64: berlin: Select DW_APB_TIMER_OF (git-fixes) Update arm64 default config too. - arm64: Clear OSDLR_EL1 on CPU boot (git-fixes) - arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes). - arm64: compat: Allow single-byte watchpoints on all addresses (git-fixes) - arm64: compat: Reduce address limit (git-fixes) - arm64: cpufeature: Fix feature comparison for CTR_EL0.{CWG,ERG} (git-fixes) - arm64: cpufeature: Fix the type of no FP/SIMD capability (git-fixes) - arm64: cpufeature: Set the FP/SIMD compat HWCAP bits properly (git-fixes) - arm64: csum: Fix handling of bad packets (git-fixes) - arm64: debug: Do not propagate UNKNOWN FAR into si_code for debug (git-fixes) - arm64: debug: Ensure debug handlers check triggering exception level (git-fixes) - arm64: dts: marvell: Fix A37xx UART0 register size (git-fixes) - arm64: entry: SP Alignment Fault does not write to FAR_EL1 (git-fixes) - arm64: Extend workaround for erratum 1024718 to all versions of (git-fixes) - arm64: Fix HCR.TGE status for NMI contexts (git-fixes) - arm64: fix inline asm in load_unaligned_zeropad() (git-fixes) - arm64: Fix size of __early_cpu_boot_status (git-fixes) - arm64: fix the flush_icache_range arguments in machine_kexec (git-fixes) - arm64: futex: Avoid copying out uninitialised stack in failed (git-fixes) - arm64: futex: Bound number of LDXR/STXR loops in FUTEX_WAKE_OP (git-fixes) - arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (git-fixes) - arm64: futex: Restore oldval initialization to work around buggy (git-fixes) - arm64: hibernate: check pgd table allocation (git-fixes) - arm64: hugetlb: avoid potential NULL dereference (git-fixes) - arm64: hw_breakpoint: Do not invoke overflow handler on uaccess (git-fixes) - arm64: kbuild: remove compressed images on 'make ARCH=arm64 (git-fixes) - arm64: kdump: update ppos when reading elfcorehdr (git-fixes) - arm64: kgdb: Fix single-step exception handling oops (git-fixes) - arm64: kprobes: Recover pstate.D in single-step exception handler (git-fixes) - arm64: module: remove (NOLOAD) from linker script (git-fixes) - arm64: perf: Report the PC value in REGS_ABI_32 mode (git-fixes) - arm64: ptrace: nofpsimd: Fail FP/SIMD regset operations (git-fixes) - arm64: ptrace: Override SPSR.SS when single-stepping is enabled (git-fixes) - arm64: Relax GIC version check during early boot (git-fixes) - arm64: Save and restore OSDLR_EL1 across suspend/resume (git-fixes) - arm64: smp: fix crash_smp_send_stop() behaviour (git-fixes) - arm64: smp: fix smp_send_stop() behaviour (git-fixes) - arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess (git-fixes) - arm64: uprobe: Return EOPNOTSUPP for AARCH32 instruction probing (git-fixes) - arm64/iommu: handle non-remapped addresses in ->mmap and (git-fixes) - arm64/mm: avoid fixmap race condition when create pud mapping (git-fixes) - bonding: pair enable_port with slave_arr_updates (git-fixes). - btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399). - btrfs: tree-checker: fix incorrect printk format (bsc#1200249). - cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839). - cputime, cpuacct: Include guest time in user time in (git-fixes) - crypto: arm64/aes-neonbs - do not access already-freed walk.iv (git-fixes) - crypto: ixp4xx - dma_unmap the correct address (git-fixes). - crypto: qat - do not cast parameter in bit operations (git-fixes). - crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (bsc#1197601). - crypto: virtio - deal with unsupported input sizes (git-fixes). - crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes). - drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes). - drbd: Fix five use after free bugs in get_initial_state (git-fixes). - drivers: net: xgene: Fix regression in CRC stripping (git-fixes). - drm/fb-helper: Mark screen buffers in system memory with (bsc#1129770) - i40e: always propagate error value in i40e_set_vsi_promisc() (git-fixes). - i40e: Fix MAC address setting for a VF via Host/VM (git-fixes). - i40e: fix return of uninitialized aq_ret in i40e_set_vsi_promisc (git-fixes). - i40e: Fix the conditional for i40e_vc_validate_vqs_bitmaps (git-fixes). - i40e: Fix virtchnl_queue_select bitmap validation (git-fixes). - i40e: Refactoring VF MAC filters counting to make more reliable (git-fixes). - i40e: Remove scheduling while atomic possibility (git-fixes). - iavf: Fix incorrect adapter get in iavf_resume (git-fixes). - Input: aiptek - properly check endpoint type (git-fixes). - Input: appletouch - initialize work before device registration (git-fixes). - Input: elantench - fix misreporting trackpoint coordinates (git-fixes). - Input: spaceball - fix parsing of movement data packets (git-fixes). - Input: ti_am335x_tsc - fix STEPCONFIG setup for Z2 (git-fixes). - Input: ti_am335x_tsc - set ADCREFM for X configuration (git-fixes). - Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes). - KVM: arm64: Fix definition of PAGE_HYP_DEVICE (git-fixes) - KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes). - KVM: PPC: Propagate errors to the guest when failed instead of ignoring (bsc#1061840 git-fixes). - lpfc: Set default protocol support to FCP only (bsc#1194124 bsc#1198899). - media: cpia2: fix control-message timeouts (git-fixes). - media: cx23885: Fix snd_card_free call on null card pointer (git-fixes). - media: dib0700: fix undefined behavior in tuner shutdown (git-fixes). - media: dmxdev: fix UAF when dvb_register_device() fails (git-fixes). - media: em28xx: fix control-message timeouts. - media: flexcop-usb: fix control-message timeouts (git-fixes). - media: mceusb: fix control-message timeouts (git-fixes). - media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes). - media: netup_unidvb: Do not leak SPI master in probe error path (git-fixes). - media: pvrusb2: fix control-message timeouts (git-fixes). - media: redrat3: fix control-message timeouts (git-fixes). - media: s2255: fix control-message timeouts (git-fixes). - media: stk1160: fix control-message timeouts (git-fixes). - media: vim2m: Remove surplus name initialization (git-fixes). - mm, page_alloc: fix build_zonerefs_node() (git-fixes). - net: bcmgenet: Do not claim WOL when its not available (git-fixes). - net: mana: Add counter for packet dropped by XDP (bsc#1195651). - net: mana: Add counter for XDP_TX (bsc#1195651). - net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651). - net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651). - net: mana: Reuse XDP dropped page (bsc#1195651). - net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651). - net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes). - net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (git-fixes). - netfilter: conntrack: connection timeout after re-register (bsc#1199035). - netfilter: conntrack: move synack init code to helper (bsc#1199035). - netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035). - netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035). - netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035). - netfilter: nf_tables: disallow non-stateful expression in sets earlier (bsc#1200015). - NFS: Do not invalidate inode attributes on delegation return (git-fixes). - NFS: limit use of ACCESS cache for negative responses (bsc#1196570). - PCI / ACPI: Mark expected switch fall-through (git-fixes). - PCI: Do not enable AtomicOps on VFs (bsc#1129770) - PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314). - powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753). - powerpc: Remove Power8 DD1 from cputable (bsc#1055117 ltc#159753). - powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes). - powerpc/numa: Prefer node id queried from vphn (bsc#1199237 bsc#1200173 ltc#198329). - powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes). - powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes). - powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes). - powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes). - powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes). - qed: display VF trust config (git-fixes). - qed: return status of qed_iov_get_link (git-fixes). - qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes). - revert scsi: qla2xxx: Changes to support FCP2 Target (bsc#1198438). - sched/core: Add __sched tag for io_schedule() (git-fixes) - sched/core: Fix comment regarding nr_iowait_cpu() and (git-fixes) - sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes) - scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes). - scsi: fnic: Fix a tracing statement (git-fixes). - scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631). - scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes). - scsi: pm8001: Fix abort all task initialization (git-fixes). - scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes). - scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes). - scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes). - scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes). - scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes). - scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes). - scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes). - scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes). - scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes). - scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200045). - scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200045). - scsi: qla2xxx: Remove free_sg command flag (bsc#1200045). - scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200045). - scsi: sr: Do not leak information in ioctl (git-fixes). - scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes). - scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes). - smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes). - SUNRPC: Ensure gss-proxy connects on setup (git-fixes). - SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes). - timekeeping: Really make sure wall_to_monotonic isn't (git-fixes) - tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729). - USB: cdc-wdm: fix reading stuck on device close (git-fixes). - USB: dwc3: core: Only handle soft-reset in DCTL (git-fixes). - USB: dwc3: gadget: Do not send unintended link state change (git-fixes). - USB: hub: Fix locking issues with address0_mutex (git-fixes). - USB: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes). - USB: quirks: add a Realtek card reader (git-fixes). - USB: quirks: add STRING quirk for VCOM device (git-fixes). - USB: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes). - USB: serial: option: add Fibocom L610 modem (git-fixes). - USB: serial: option: add Fibocom MA510 modem (git-fixes). - USB: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes). - USB: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes). - USB: serial: pl2303: add device id for HP LM930 Display (git-fixes). - USB: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes). - USB: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes). - veth: Ensure eth header is in skb's linear part (git-fixes). - video: backlight: Drop maximum brightness override for brightness (bsc#1129770) - video: hyperv_fb: Fix validation of screen resolution (bsc#1129770) - vxlan: fix memleak of fdb (git-fixes). - xhci: stop polling roothubs after shutdown (git-fixes).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1024718 1055117 1061840 1065729 1082318 1118987 1129770 1133297 1158266 1162197 1162200 1162338 1162369 1173871 1188885 1194124 1195651 1196426 1196570 1197219 1197601 1198438 1198577 1198899 1199035 1199063 1199237 1199239 1199314 1199399 1199426 1199505 1199507 1199526 1199602 1199605 1199606 1199631 1199650 1199671 1199839 1200015 1200045 1200057 1200143 1200144 1200173 1200249 862963 CVE-2006-7250 CVE-2007-6746 CVE-2008-2109 CVE-2008-4546 CVE-2009-0590 CVE-2009-0591 CVE-2009-0696 CVE-2009-0789 CVE-2009-0901 CVE-2009-1210 CVE-2009-1267 CVE-2009-1268 CVE-2009-1269 CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 CVE-2009-1386 CVE-2009-1387 CVE-2009-1862 CVE-2009-1863 CVE-2009-1864 CVE-2009-1865 CVE-2009-1866 CVE-2009-1867 CVE-2009-1868 CVE-2009-1869 CVE-2009-1870 CVE-2009-2395 CVE-2009-2493 CVE-2009-3241 CVE-2009-3242 CVE-2009-3243 CVE-2009-3245 CVE-2009-3555 CVE-2009-3793 CVE-2009-3794 CVE-2009-3796 CVE-2009-3797 CVE-2009-3798 CVE-2009-3799 CVE-2009-3800 CVE-2009-3951 CVE-2009-4022 CVE-2009-4355 CVE-2009-5146 CVE-2010-0186 CVE-2010-0187 CVE-2010-0209 CVE-2010-0740 CVE-2010-1297 CVE-2010-1455 CVE-2010-2074 CVE-2010-2160 CVE-2010-2161 CVE-2010-2162 CVE-2010-2163 CVE-2010-2164 CVE-2010-2165 CVE-2010-2166 CVE-2010-2167 CVE-2010-2169 CVE-2010-2170 CVE-2010-2171 CVE-2010-2172 CVE-2010-2173 CVE-2010-2174 CVE-2010-2175 CVE-2010-2176 CVE-2010-2177 CVE-2010-2178 CVE-2010-2179 CVE-2010-2180 CVE-2010-2181 CVE-2010-2182 CVE-2010-2183 CVE-2010-2184 CVE-2010-2185 CVE-2010-2186 CVE-2010-2187 CVE-2010-2188 CVE-2010-2189 CVE-2010-2213 CVE-2010-2214 CVE-2010-2216 CVE-2010-2884 CVE-2010-2939 CVE-2010-2993 CVE-2010-3445 CVE-2010-3613 CVE-2010-3614 CVE-2010-3615 CVE-2010-3654 CVE-2010-3864 CVE-2010-4180 CVE-2010-4252 CVE-2010-4300 CVE-2010-4301 CVE-2010-4538 CVE-2011-0014 CVE-2011-0024 CVE-2011-0414 CVE-2011-0538 CVE-2011-0558 CVE-2011-0559 CVE-2011-0560 CVE-2011-0561 CVE-2011-0571 CVE-2011-0572 CVE-2011-0573 CVE-2011-0574 CVE-2011-0575 CVE-2011-0577 CVE-2011-0578 CVE-2011-0589 CVE-2011-0607 CVE-2011-0608 CVE-2011-0609 CVE-2011-0611 CVE-2011-0618 CVE-2011-0619 CVE-2011-0620 CVE-2011-0621 CVE-2011-0622 CVE-2011-0623 CVE-2011-0624 CVE-2011-0625 CVE-2011-0626 CVE-2011-0627 CVE-2011-0713 CVE-2011-1138 CVE-2011-1139 CVE-2011-1140 CVE-2011-1143 CVE-2011-1590 CVE-2011-1591 CVE-2011-1592 CVE-2011-1907 CVE-2011-1910 CVE-2011-1957 CVE-2011-1958 CVE-2011-1959 CVE-2011-2107 CVE-2011-2110 CVE-2011-2130 CVE-2011-2134 CVE-2011-2135 CVE-2011-2136 CVE-2011-2137 CVE-2011-2138 CVE-2011-2139 CVE-2011-2140 CVE-2011-2174 CVE-2011-2175 CVE-2011-2414 CVE-2011-2415 CVE-2011-2416 CVE-2011-2417 CVE-2011-2425 CVE-2011-2445 CVE-2011-2450 CVE-2011-2451 CVE-2011-2452 CVE-2011-2453 CVE-2011-2454 CVE-2011-2455 CVE-2011-2456 CVE-2011-2457 CVE-2011-2458 CVE-2011-2459 CVE-2011-2460 CVE-2011-2464 CVE-2011-2597 CVE-2011-2698 CVE-2011-3210 CVE-2011-3266 CVE-2011-3360 CVE-2011-3483 CVE-2011-4108 CVE-2011-4109 CVE-2011-4313 CVE-2011-4354 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2011-5095 CVE-2012-0050 CVE-2012-0751 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 CVE-2012-0884 CVE-2012-1165 CVE-2012-1535 CVE-2012-1667 CVE-2012-2034 CVE-2012-2035 CVE-2012-2036 CVE-2012-2037 CVE-2012-2038 CVE-2012-2039 CVE-2012-2040 CVE-2012-2110 CVE-2012-2131 CVE-2012-2333 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 CVE-2012-2451 CVE-2012-2737 CVE-2012-3548 CVE-2012-3817 CVE-2012-3868 CVE-2012-4048 CVE-2012-4049 CVE-2012-4244 CVE-2012-4285 CVE-2012-4286 CVE-2012-4287 CVE-2012-4288 CVE-2012-4289 CVE-2012-4290 CVE-2012-4291 CVE-2012-4292 CVE-2012-4293 CVE-2012-4294 CVE-2012-4295 CVE-2012-4296 CVE-2012-4297 CVE-2012-4298 CVE-2012-4929 CVE-2012-5166 CVE-2012-5237 CVE-2012-5238 CVE-2012-5239 CVE-2012-5240 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265 CVE-2012-5266 CVE-2012-5267 CVE-2012-5268 CVE-2012-5269 CVE-2012-5270 CVE-2012-5271 CVE-2012-5272 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 CVE-2012-5688 CVE-2012-5689 CVE-2013-0166 CVE-2013-0169 CVE-2013-0504 CVE-2013-0630 CVE-2013-0633 CVE-2013-0634 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639 CVE-2013-0642 CVE-2013-0643 CVE-2013-0644 CVE-2013-0645 CVE-2013-0646 CVE-2013-0647 CVE-2013-0648 CVE-2013-0649 CVE-2013-0650 CVE-2013-1365 CVE-2013-1366 CVE-2013-1367 CVE-2013-1368 CVE-2013-1369 CVE-2013-1370 CVE-2013-1371 CVE-2013-1372 CVE-2013-1373 CVE-2013-1374 CVE-2013-1375 CVE-2013-1378 CVE-2013-1379 CVE-2013-1380 CVE-2013-1572 CVE-2013-1573 CVE-2013-1574 CVE-2013-1575 CVE-2013-1576 CVE-2013-1577 CVE-2013-1578 CVE-2013-1579 CVE-2013-1580 CVE-2013-1581 CVE-2013-1582 CVE-2013-1583 CVE-2013-1584 CVE-2013-1585 CVE-2013-1586 CVE-2013-1587 CVE-2013-1588 CVE-2013-1589 CVE-2013-1590 CVE-2013-2126 CVE-2013-2127 CVE-2013-2266 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 CVE-2013-2555 CVE-2013-2728 CVE-2013-3324 CVE-2013-3325 CVE-2013-3326 CVE-2013-3327 CVE-2013-3328 CVE-2013-3329 CVE-2013-3330 CVE-2013-3331 CVE-2013-3332 CVE-2013-3333 CVE-2013-3334 CVE-2013-3335 CVE-2013-3343 CVE-2013-3344 CVE-2013-3345 CVE-2013-3347 CVE-2013-3361 CVE-2013-3362 CVE-2013-3363 CVE-2013-3555 CVE-2013-3556 CVE-2013-3557 CVE-2013-3558 CVE-2013-3559 CVE-2013-3560 CVE-2013-3561 CVE-2013-3562 CVE-2013-4083 CVE-2013-4238 CVE-2013-4854 CVE-2013-4920 CVE-2013-4921 CVE-2013-4922 CVE-2013-4923 CVE-2013-4924 CVE-2013-4925 CVE-2013-4926 CVE-2013-4927 CVE-2013-4928 CVE-2013-4929 CVE-2013-4930 CVE-2013-4931 CVE-2013-4932 CVE-2013-4933 CVE-2013-4934 CVE-2013-4935 CVE-2013-4936 CVE-2013-5324 CVE-2013-5329 CVE-2013-5330 CVE-2013-5331 CVE-2013-5332 CVE-2013-5717 CVE-2013-5718 CVE-2013-5719 CVE-2013-5720 CVE-2013-5721 CVE-2013-5722 CVE-2013-6336 CVE-2013-6337 CVE-2013-6338 CVE-2013-6339 CVE-2013-6340 CVE-2013-7112 CVE-2013-7113 CVE-2013-7114 CVE-2014-0076 CVE-2014-0221 CVE-2014-0224 CVE-2014-0491 CVE-2014-0492 CVE-2014-0497 CVE-2014-0498 CVE-2014-0499 CVE-2014-0502 CVE-2014-0503 CVE-2014-0506 CVE-2014-0507 CVE-2014-0508 CVE-2014-0509 CVE-2014-0515 CVE-2014-0516 CVE-2014-0517 CVE-2014-0518 CVE-2014-0519 CVE-2014-0520 CVE-2014-0531 CVE-2014-0532 CVE-2014-0533 CVE-2014-0534 CVE-2014-0535 CVE-2014-0536 CVE-2014-0537 CVE-2014-0538 CVE-2014-0539 CVE-2014-0540 CVE-2014-0541 CVE-2014-0542 CVE-2014-0543 CVE-2014-0544 CVE-2014-0545 CVE-2014-0547 CVE-2014-0548 CVE-2014-0549 CVE-2014-0550 CVE-2014-0551 CVE-2014-0552 CVE-2014-0553 CVE-2014-0554 CVE-2014-0555 CVE-2014-0556 CVE-2014-0557 CVE-2014-0558 CVE-2014-0559 CVE-2014-0564 CVE-2014-0569 CVE-2014-0573 CVE-2014-0574 CVE-2014-0576 CVE-2014-0577 CVE-2014-0580 CVE-2014-0581 CVE-2014-0582 CVE-2014-0583 CVE-2014-0584 CVE-2014-0585 CVE-2014-0586 CVE-2014-0587 CVE-2014-0588 CVE-2014-0589 CVE-2014-0590 CVE-2014-0591 CVE-2014-2281 CVE-2014-2282 CVE-2014-2283 CVE-2014-2299 CVE-2014-2907 CVE-2014-3470 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3510 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-3675 CVE-2014-3676 CVE-2014-3677 CVE-2014-4020 CVE-2014-4671 CVE-2014-5044 CVE-2014-5161 CVE-2014-5162 CVE-2014-5163 CVE-2014-5164 CVE-2014-5165 CVE-2014-8275 CVE-2014-8437 CVE-2014-8438 CVE-2014-8439 CVE-2014-8440 CVE-2014-8441 CVE-2014-8442 CVE-2014-8443 CVE-2014-8500 CVE-2014-9162 CVE-2014-9163 CVE-2014-9164 CVE-2015-0204 CVE-2015-0205 CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 CVE-2015-0301 CVE-2015-0302 CVE-2015-0303 CVE-2015-0304 CVE-2015-0305 CVE-2015-0306 CVE-2015-0307 CVE-2015-0308 CVE-2015-0309 CVE-2015-0310 CVE-2015-0311 CVE-2015-0313 CVE-2015-0314 CVE-2015-0315 CVE-2015-0316 CVE-2015-0317 CVE-2015-0318 CVE-2015-0319 CVE-2015-0320 CVE-2015-0321 CVE-2015-0322 CVE-2015-0323 CVE-2015-0324 CVE-2015-0325 CVE-2015-0326 CVE-2015-0327 CVE-2015-0328 CVE-2015-0329 CVE-2015-0330 CVE-2015-0331 CVE-2015-0332 CVE-2015-0333 CVE-2015-0334 CVE-2015-0335 CVE-2015-0336 CVE-2015-0337 CVE-2015-0338 CVE-2015-0339 CVE-2015-0340 CVE-2015-0341 CVE-2015-0342 CVE-2015-0346 CVE-2015-0347 CVE-2015-0348 CVE-2015-0349 CVE-2015-0350 CVE-2015-0351 CVE-2015-0352 CVE-2015-0353 CVE-2015-0354 CVE-2015-0355 CVE-2015-0356 CVE-2015-0357 CVE-2015-0358 CVE-2015-0359 CVE-2015-0360 CVE-2015-1349 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3038 CVE-2015-3039 CVE-2015-3040 CVE-2015-3041 CVE-2015-3042 CVE-2015-3043 CVE-2015-3044 CVE-2015-3077 CVE-2015-3078 CVE-2015-3079 CVE-2015-3080 CVE-2015-3081 CVE-2015-3082 CVE-2015-3083 CVE-2015-3084 CVE-2015-3085 CVE-2015-3086 CVE-2015-3087 CVE-2015-3088 CVE-2015-3089 CVE-2015-3090 CVE-2015-3091 CVE-2015-3092 CVE-2015-3093 CVE-2015-3096 CVE-2015-3098 CVE-2015-3099 CVE-2015-3100 CVE-2015-3102 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 CVE-2015-3108 CVE-2015-3113 CVE-2015-3216 CVE-2015-4000 CVE-2015-4620 CVE-2015-5119 CVE-2015-5122 CVE-2015-5123 CVE-2015-5124 CVE-2015-5125 CVE-2015-5127 CVE-2015-5128 CVE-2015-5129 CVE-2015-5130 CVE-2015-5131 CVE-2015-5132 CVE-2015-5133 CVE-2015-5134 CVE-2015-5276 CVE-2015-5477 CVE-2015-5539 CVE-2015-5540 CVE-2015-5541 CVE-2015-5544 CVE-2015-5545 CVE-2015-5546 CVE-2015-5547 CVE-2015-5548 CVE-2015-5549 CVE-2015-5550 CVE-2015-5551 CVE-2015-5552 CVE-2015-5553 CVE-2015-5554 CVE-2015-5555 CVE-2015-5556 CVE-2015-5557 CVE-2015-5558 CVE-2015-5559 CVE-2015-5560 CVE-2015-5561 CVE-2015-5562 CVE-2015-5563 CVE-2015-5567 CVE-2015-5568 CVE-2015-5569 CVE-2015-5570 CVE-2015-5571 CVE-2015-5572 CVE-2015-5573 CVE-2015-5574 CVE-2015-5575 CVE-2015-5576 CVE-2015-5577 CVE-2015-5578 CVE-2015-5579 CVE-2015-5580 CVE-2015-5581 CVE-2015-5582 CVE-2015-5584 CVE-2015-5587 CVE-2015-5588 CVE-2015-5722 CVE-2015-6676 CVE-2015-6677 CVE-2015-6678 CVE-2015-6679 CVE-2015-6682 CVE-2015-7625 CVE-2015-7626 CVE-2015-7627 CVE-2015-7628 CVE-2015-7629 CVE-2015-7630 CVE-2015-7631 CVE-2015-7632 CVE-2015-7633 CVE-2015-7634 CVE-2015-7643 CVE-2015-7644 CVE-2015-7645 CVE-2015-7651 CVE-2015-7652 CVE-2015-7653 CVE-2015-7654 CVE-2015-7655 CVE-2015-7656 CVE-2015-7657 CVE-2015-7658 CVE-2015-7659 CVE-2015-7660 CVE-2015-7661 CVE-2015-7662 CVE-2015-7663 CVE-2015-8000 CVE-2015-8042 CVE-2015-8043 CVE-2015-8044 CVE-2015-8046 CVE-2015-8704 CVE-2016-1285 CVE-2016-1286 CVE-2016-2776 CVE-2018-11805 CVE-2019-19377 CVE-2020-1930 CVE-2020-1931 CVE-2021-33061 CVE-2021-39711 CVE-2022-1184 CVE-2022-1652 CVE-2022-1729 CVE-2022-1734 CVE-2022-1966 CVE-2022-1974 CVE-2022-1975 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 CVE-2022-21499 CVE-2022-30594 SUSE-SU-2020:0813-1 SUSE-SU-2020:1396-2 SUSE-SU-2022:2116-1
|
Platform(s): | openSUSE 13.1 openSUSE 13.1 NonFree SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Desktop 12 SUSE Linux Enterprise Desktop 12 SP1 SUSE Linux Enterprise Desktop 12 SP2 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise Desktop 12 SP4 SUSE Linux Enterprise for SAP 12 SUSE Linux Enterprise High Availability 12 SP2 SUSE Linux Enterprise High Availability 12 SP3 SUSE Linux Enterprise High Availability 12 SP4 SUSE Linux Enterprise High Performance Computing 12 SP5 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Live Patching 12 SP3 SUSE Linux Enterprise Module for Advanced Systems Management 12 SUSE Linux Enterprise Module for Containers 12 SUSE Linux Enterprise Module for Legacy Software 12 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Module for Web Scripting 12 SUSE Linux Enterprise Real Time Extension 12 SP2 SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP3-LTSS SUSE Linux Enterprise Server 11 SP4 SUSE Linux Enterprise Server 11-SECURITY SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 SUSE Linux Enterprise Server for SAP Applications 12 SUSE Linux Enterprise Server for SAP Applications 12 SP5 SUSE Linux Enterprise Software Development Kit 11 SP4 SUSE Linux Enterprise Software Development Kit 12 SP2 SUSE Linux Enterprise Software Development Kit 12 SP3 SUSE Linux Enterprise Software Development Kit 12 SP4 SUSE Linux Enterprise Software Development Kit 12 SP5 SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Workstation Extension 12 SP1 SUSE Linux Enterprise Workstation Extension 12 SP2 SUSE OpenStack Cloud 5
| Product(s): | |
Definition Synopsis |
SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 is installed AND Package Information
openstack-ceilometer-2014.2.4.dev18-3.2 is installed
OR openstack-ceilometer-agent-compute-2014.2.4.dev18-3.2 is installed
OR openstack-neutron-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-dhcp-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-ha-tool-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-l3-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-lbaas-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-linuxbridge-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-metadata-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-metering-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-openvswitch-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-neutron-vpn-agent-2014.2.4~a0~dev78-7.2 is installed
OR openstack-nova-2014.2.4~a0~dev61-6.2 is installed
OR openstack-nova-compute-2014.2.4~a0~dev61-6.2 is installed
OR openstack-suse-2014.2-5.1 is installed
OR openstack-suse-sudo-2014.2-5.1 is installed
OR python-ceilometer-2014.2.4.dev18-3.2 is installed
OR python-neutron-2014.2.4~a0~dev78-7.2 is installed
OR python-nova-2014.2.4~a0~dev61-6.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP3 is installed
AND Package Information
curl-7.19.7-1.38.1 is installed
OR libcurl4-7.19.7-1.38.1 is installed
OR libcurl4-32bit-7.19.7-1.38.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP4 is installed
AND Package Information
xen-4.4.2_10-5.1 is installed
OR xen-doc-html-4.4.2_10-5.1 is installed
OR xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed
OR xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed
OR xen-libs-4.4.2_10-5.1 is installed
OR xen-libs-32bit-4.4.2_10-5.1 is installed
OR xen-tools-4.4.2_10-5.1 is installed
OR xen-tools-domU-4.4.2_10-5.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed
AND Package Information
python-2.7.7-2 is installed
OR python-curses-2.7.7-2 is installed
OR python-tk-2.7.7-2 is installed
OR python3-3.4.1-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP1 is installed
AND Package Information
cpp48-4.8.5-24 is installed
OR gcc48-4.8.5-24 is installed
OR gcc48-32bit-4.8.5-24 is installed
OR gcc48-c++-4.8.5-24 is installed
OR gcc48-gij-4.8.5-24 is installed
OR gcc48-gij-32bit-4.8.5-24 is installed
OR gcc48-info-4.8.5-24 is installed
OR libasan0-4.8.5-24 is installed
OR libasan0-32bit-4.8.5-24 is installed
OR libgcj48-4.8.5-24 is installed
OR libgcj48-32bit-4.8.5-24 is installed
OR libgcj48-jar-4.8.5-24 is installed
OR libgcj_bc1-4.8.5-24 is installed
OR libstdc++48-devel-4.8.5-24 is installed
OR libstdc++48-devel-32bit-4.8.5-24 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed
AND Package Information
accountsservice-0.6.42-14 is installed
OR accountsservice-lang-0.6.42-14 is installed
OR libaccountsservice0-0.6.42-14 is installed
OR typelib-1_0-AccountsService-1_0-0.6.42-14 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND Package Information
cpio-2.11-35 is installed
OR cpio-lang-2.11-35 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP4 is installed
AND Package Information
ecryptfs-utils-103-8.3 is installed
OR ecryptfs-utils-32bit-103-8.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise for SAP 12 is installed
AND Package Information
kgraft-patch-3_12_55-52_45-default-2-2.3 is installed
OR kgraft-patch-3_12_55-52_45-xen-2-2.3 is installed
OR kgraft-patch-SLE12_Update_13-2-2.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP2 is installed
AND python-PyYAML-3.10-17 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP3 is installed
AND Package Information
cluster-md-kmp-default-4.4.73-5 is installed
OR dlm-kmp-default-4.4.73-5 is installed
OR gfs2-kmp-default-4.4.73-5 is installed
OR ocfs2-kmp-default-4.4.73-5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP4 is installed
AND ruby2.1-rubygem-bundler-1.7.3-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Performance Computing 12 SP5 is installed
AND apache-commons-httpclient-3.1-4 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise High Performance Computing 15-ESPOS is installed
AND
perl-Mail-SpamAssassin-3.4.2-7.9 is installed
OR perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-7.9 is installed
OR spamassassin-3.4.2-7.9 is installed
OR Package Information
SUSE Linux Enterprise High Performance Computing 15-LTSS is installed
AND
perl-Mail-SpamAssassin-3.4.2-7.9 is installed
OR perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-7.9 is installed
OR spamassassin-3.4.2-7.9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Live Patching 12 is installed
AND Package Information
kgraft-patch-3_12_59-60_45-default-6-2 is installed
OR kgraft-patch-3_12_59-60_45-xen-6-2 is installed
OR kgraft-patch-SLE12-SP1_Update_6-6-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Live Patching 12 SP3 is installed
AND Package Information
kgraft-patch-4_4_82-6_3-default-2-2.1 is installed
OR kgraft-patch-SLE12-SP3_Update_1-2-2.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Advanced Systems Management 12 is installed
AND facter-2.0.2-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Containers 12 is installed
AND docker-1.6.2-31 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Legacy Software 12 is installed
AND Package Information
java-1_6_0-ibm-1.6.0_sr16.7-22.2 is installed
OR java-1_6_0-ibm-fonts-1.6.0_sr16.7-22.2 is installed
OR java-1_6_0-ibm-jdbc-1.6.0_sr16.7-22.2 is installed
OR java-1_6_0-ibm-plugin-1.6.0_sr16.7-22.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Public Cloud 12 is installed
AND python-pycrypto-2.6.1-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Web Scripting 12 is installed
AND Package Information
nodejs4-4.5.0-5 is installed
OR nodejs4-devel-4.5.0-5 is installed
OR nodejs4-docs-4.5.0-5 is installed
OR npm4-4.5.0-5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Real Time Extension 12 SP2 is installed
AND Package Information
cluster-md-kmp-rt-4.4.88-18 is installed
OR cluster-network-kmp-rt-4.4.88-18 is installed
OR dlm-kmp-rt-4.4.88-18 is installed
OR gfs2-kmp-rt-4.4.88-18 is installed
OR kernel-devel-rt-4.4.88-18 is installed
OR kernel-rt-4.4.88-18 is installed
OR kernel-rt-base-4.4.88-18 is installed
OR kernel-rt-devel-4.4.88-18 is installed
OR kernel-rt_debug-4.4.88-18 is installed
OR kernel-rt_debug-devel-4.4.88-18 is installed
OR kernel-source-rt-4.4.88-18 is installed
OR kernel-syms-rt-4.4.88-18 is installed
OR ocfs2-kmp-rt-4.4.88-18 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP2 is installed
AND apache2-mod_perl-2.0.4-40.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3 is installed
AND Package Information
PolicyKit-0.9-14.41.1 is installed
OR PolicyKit-32bit-0.9-14.41.1 is installed
OR PolicyKit-doc-0.9-14.39.2 is installed
OR PolicyKit-x86-0.9-14.41.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP4 is installed
AND Package Information
libapr1-1.3.3-11.18.19.8 is installed
OR libapr1-32bit-1.3.3-11.18.19.8 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 is installed
AND ant-1.9.4-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND apache2-mod_jk-1.2.40-5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
jasper-1.900.14-181.1 is installed
OR libjasper1-1.900.14-181.1 is installed
OR libjasper1-32bit-1.900.14-181.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
dhcp-4.3.3-9 is installed
OR dhcp-client-4.3.3-9 is installed
OR dhcp-relay-4.3.3-9 is installed
OR dhcp-server-4.3.3-9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
apache-commons-beanutils-1.9.2-1 is installed
OR apache-commons-beanutils-javadoc-1.9.2-1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP5 is installed
OR SUSE Linux Enterprise Server for SAP Applications 12 SP5 is installed
OR SUSE Linux Enterprise Software Development Kit 12 SP5 is installed
AND Package Information
kernel-docs-4.12.14-122.124.2 is installed
OR kernel-obs-build-4.12.14-122.124.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12-LTSS is installed
AND Package Information
openvpn-2.3.8-16.17.1 is installed
OR openvpn-auth-pam-plugin-2.3.8-16.17.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 15-LTSS is installed
AND Package Information
libzstd1-1.4.4-1.3 is installed
OR libzstd1-32bit-1.4.4-1.3 is installed
OR zstd-1.4.4-1.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
AND Package Information
libmysqlclient18-10.0.32-29.10 is installed
OR mariadb-10.0.32-29.10 is installed
OR mariadb-client-10.0.32-29.10 is installed
OR mariadb-errormessages-10.0.32-29.10 is installed
OR mariadb-tools-10.0.32-29.10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 12 is installed
AND Package Information
postgresql93-9.3.14-19 is installed
OR postgresql93-contrib-9.3.14-19 is installed
OR postgresql93-docs-9.3.14-19 is installed
OR postgresql93-server-9.3.14-19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
AND Package Information
avahi-compat-howl-devel-0.6.23-11.32.1 is installed
OR avahi-compat-mDNSResponder-devel-0.6.23-11.32.1 is installed
OR libavahi-devel-0.6.23-11.32.1 is installed
OR libhowl0-0.6.23-11.32.1 is installed
OR python-avahi-0.6.23-11.32.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
AND libzip-devel-0.11.1-12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
AND aaa_base-malloccheck-13.2+git20140911.61c1681-36 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
AND LibVNCServer-devel-0.9.9-17.5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 is installed
AND Package Information
python-backports.ssl_match_hostname-3.4.0.2-15.1 is installed
OR python-tornado-4.2.1-11.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
AND Package Information
ImageMagick-6.8.8.1-33.1 is installed
OR libMagick++-6_Q16-3-6.8.8.1-33.1 is installed
OR libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
AND Package Information
libcares2-1.9.1-5.1 is installed
OR libcares2-32bit-1.9.1-5.1 is installed
|