Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port failed to add a port, which may have caused denial of service (bsc#1152685).
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory support could be used to facilitate sidechannel information leaks out of microarchitectural buffers, similar to the previously described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation altogether (requiring CPU Microcode updates on older systems) and better flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).
- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE, leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell libertas driver (bsc#1150465).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which meant that unprivileged users could create a raw socket (bnc#1152782).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which meant that unprivileged users could create a raw socket (bsc#1152788).
- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly, which caused an i_size_read() infinite loop and denial of service on SMP systems (bnc#1151347).
- CVE-2019-15902: A backporting issue was discovered that re-introduced the Spectre vulnerability it had aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped (bnc#1149376).
- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused by a malicious USB device (bnc#1146519).
- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused to cause denial of service (bnc#1148938).
- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a process that wants to create a ptrace relationship, which allowed local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). (bnc#1140671).
- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM hypervisor. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system (bnc#1151350).
- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by crafted USB device traffic (bnc#1147122).
- CVE-2017-18595: A double free in allocate_trace_buffer was fixed (bnc#1149555).
- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost functionality that translates virtqueue buffers to IOVs. A privileged guest user able to pass descriptors with invalid length to the host could use this flaw to increase their privileges on the host (bnc#1150112).
- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious USB device (bnc#1146361).
- CVE-2019-15924: A a NULL pointer dereference has been fixed in the drivers/net/ethernet/intel/fm10k module (bnc#1149612).
- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been fixed. This issue could lead to local escalation of privilege with System execution privileges needed. (bnc#1150025).
- CVE-2019-15926: An out-of-bounds access was fixed in the drivers/net/wireless/ath/ath6kl module. (bnc#1149527).
- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer module (bnc#1149522).
- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm module that could cause denial of service (bnc#1148394).
- CVE-2017-18379: An out-of-boundary access was fixed in the drivers/nvme/target module (bnc#1143187).
- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by a malicious USB device (bnc#1146519 1146524).
- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a malicious USB device (bnc#1146519 1146526).
- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by a malicious USB device (bnc#1146519 1146529).
- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi chip driver. That issue allowed local users to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1146512).
- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed (bsc#1146512, bsc#1146514, bsc#1146516).
- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver was fixed. Local users would have abused this issue to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1146516).
- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket option, an attacker could control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. (bnc#1145477)
- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka 'KNOB') that could decrypt traffic and inject arbitrary ciphertext without the victim noticing (bnc#1137865).
- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was fixed (bnc#1146378).
- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe was fixed (bsc#1146378).
- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write queue between disconnection and re-connection, a local attacker could trigger multiple use-after-free conditions. This could result in kernel crashes or potentially in privilege escalation. (bnc#1146589)
- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver (bnc#1146391).
- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc (bnc#1146584).
- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was fixed in the drivers/media/v4l2-core driver (bnc#1146519).
- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).
- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed (bnc#1146519).
- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device was fixed in the drivers/media/usb/siano driver (bnc#1146413).
- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).
- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver (bnc#1146285).
- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver (bnc#1146163).
- CVE-2019-0154: An unprotected read access to i915 registers has been fixed that could have been abused to facilitate a local denial-of-service attack. (bsc#1135966)
- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the i915 module that allowed batch buffers from user mode to gain super user privileges. (bsc#1135967)
The following non-security bugs were fixed:
- array_index_nospec: Sanitize speculative array (bsc#1155671) - bonding/802.3ad: fix link_failure_count tracking (bsc#1141013). - bonding/802.3ad: fix slave link initialization transition states (bsc#1141013). - bonding: correctly update link status during mii-commit phase (bsc#1141013). - bonding: fix active-backup transition (bsc#1141013). - bonding: make speed, duplex setting consistent with link state (bsc#1141013). - bonding: ratelimit failed speed/duplex update warning (bsc#1141013). - bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013). - bonding: set default miimon value for non-arp modes if not set (bsc#1141013). - bonding: speed/duplex update at NETDEV_UP event (bsc#1141013). - cifs: fix panic in smb2_reconnect (bsc#1142458). - cifs: handle netapp error codes (bsc#1136261). - cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665). - ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103) - ib/core: Add mitigation for Spectre V1 (bsc#1155671) - ixgbe: sync the first fragment unconditionally (bsc#1133140). - kvm: Convert kvm_lock to a mutex (bsc#1117665). - kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083). - kvm: mmu: drop vcpu param in gpte_access (bsc#1117665). - kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665). - kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665). - kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665). - kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665). - kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665). - kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665). - kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665). - kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665). - kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665). - kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665). - kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665). - kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665). - kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083). - kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665). - kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665). - kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665). - kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665). - kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665). - kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665). - kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083). - kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665). - kvm: x86: simplify ept_misconfig (bsc#1117665). - media: smsusb: better handle optional alignment (bsc#1146413). - pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263). - powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107). - powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484). - powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840). - powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107). - scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host(). - swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140). - vmci: Release resource if the work is already queued (bsc#1051510). - x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1023415 1049255 1049621 1051510 1059061 1068612 1071767 1071777 1073935 1076119 1084878 1092420 1100167 1106061 1107190 1108719 1117665 1123161 1123872 1125674 1126503 1127034 1127223 1127308 1128574 1128977 1130972 1131107 1133140 1133860 1134399 1135335 1135365 1135966 1135967 1136261 1137584 1137865 1139073 1139358 1139826 1140652 1140671 1140903 1140945 1141013 1141054 1141181 1141401 1141402 1141452 1141453 1141454 1141968 1142023 1142254 1142458 1142857 1143045 1143048 1143187 1143189 1143191 1143333 1144123 1144257 1144273 1144288 1144524 1144903 1144920 1145477 1145920 1145922 1146042 1146163 1146285 1146361 1146378 1146391 1146413 1146425 1146512 1146514 1146516 1146519 1146524 1146526 1146529 1146540 1146543 1146547 1146550 1146584 1146589 1146848 1147022 1147122 11483483 1148383 1148394 1148938 1149083 1149376 1149522 1149527 1149555 1149612 1150003 1150025 1150112 1150250 1150452 1150457 1150465 1150727 1150942 1151347 1151350 1152685 1152782 1152788 1153108 1153158 1153191 1153263 1154103 1154372 1155131 1155671 1156317 1156321 1156525 1157770 1159046 1159913 1160152 1160153 1160192 1160790 1160851 1160968 1161088 1161089 1161670 1162972 1164322 1165631 1166847 1167244 1167976 1168593 1169770 1170170 1170657 1171273 1171560 1171594 1171661 1171909 1172166 1172167 1172175 1172176 1172409 1173580 1173986 1174420 1176756 935393 987170 CVE-2009-5155 CVE-2015-3243 CVE-2016-10906 CVE-2017-1000246 CVE-2017-11406 CVE-2017-11407 CVE-2017-11408 CVE-2017-11410 CVE-2017-11411 CVE-2017-17456 CVE-2017-17457 CVE-2017-18379 CVE-2017-18509 CVE-2017-18551 CVE-2017-18595 CVE-2017-3144 CVE-2018-12207 CVE-2018-13139 CVE-2018-20855 CVE-2018-20856 CVE-2018-20976 CVE-2019-0154 CVE-2019-0155 CVE-2019-1010083 CVE-2019-10207 CVE-2019-10220 CVE-2019-10220 CVE-2019-11135 CVE-2019-1125 CVE-2019-11810 CVE-2019-13272 CVE-2019-13272 CVE-2019-13456 CVE-2019-13631 CVE-2019-13648 CVE-2019-14283 CVE-2019-14284 CVE-2019-14814 CVE-2019-14815 CVE-2019-14816 CVE-2019-14821 CVE-2019-14835 CVE-2019-15043 CVE-2019-15098 CVE-2019-15117 CVE-2019-15118 CVE-2019-15211 CVE-2019-15212 CVE-2019-15214 CVE-2019-15215 CVE-2019-15216 CVE-2019-15217 CVE-2019-15218 CVE-2019-15219 CVE-2019-15220 CVE-2019-15221 CVE-2019-15239 CVE-2019-15239 CVE-2019-15290 CVE-2019-15291 CVE-2019-1547 CVE-2019-15505 CVE-2019-1563 CVE-2019-15666 CVE-2019-15807 CVE-2019-15902 CVE-2019-15924 CVE-2019-15926 CVE-2019-15927 CVE-2019-16232 CVE-2019-16233 CVE-2019-16234 CVE-2019-16413 CVE-2019-16785 CVE-2019-16786 CVE-2019-16789 CVE-2019-16792 CVE-2019-16865 CVE-2019-16995 CVE-2019-17055 CVE-2019-17056 CVE-2019-17133 CVE-2019-17185 CVE-2019-17666 CVE-2019-18874 CVE-2019-19911 CVE-2019-3819 CVE-2019-3828 CVE-2019-5108 CVE-2019-9169 CVE-2019-9456 CVE-2019-9506 CVE-2020-10663 CVE-2020-10743 CVE-2020-11076 CVE-2020-11077 CVE-2020-12052 CVE-2020-12059 CVE-2020-13254 CVE-2020-13379 CVE-2020-13596 CVE-2020-15673 CVE-2020-15676 CVE-2020-15677 CVE-2020-15678 CVE-2020-1749 CVE-2020-2583 CVE-2020-2593 CVE-2020-2604 CVE-2020-2659 CVE-2020-4044 CVE-2020-5312 CVE-2020-5313 CVE-2020-5390 CVE-2020-8151 SUSE-SU-2017:2033-1 SUSE-SU-2018:0532-1 SUSE-SU-2019:1958-2 SUSE-SU-2019:2263-1 SUSE-SU-2019:2413-1 SUSE-SU-2019:2949-1 SUSE-SU-2020:0456-1 SUSE-SU-2020:1018-1 SUSE-SU-2020:1158-1 SUSE-SU-2020:1901-1 SUSE-SU-2020:1991-1 SUSE-SU-2020:2759-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 openSUSE Leap 15.2 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND nextcloud-13.0.5-5 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
kernel-debug-4.12.14-lp151.28.7 is installed
OR kernel-debug-base-4.12.14-lp151.28.7 is installed
OR kernel-debug-devel-4.12.14-lp151.28.7 is installed
OR kernel-default-4.12.14-lp151.28.7 is installed
OR kernel-default-base-4.12.14-lp151.28.7 is installed
OR kernel-default-devel-4.12.14-lp151.28.7 is installed
OR kernel-devel-4.12.14-lp151.28.7 is installed
OR kernel-docs-4.12.14-lp151.28.7 is installed
OR kernel-docs-html-4.12.14-lp151.28.7 is installed
OR kernel-kvmsmall-4.12.14-lp151.28.7 is installed
OR kernel-kvmsmall-base-4.12.14-lp151.28.7 is installed
OR kernel-kvmsmall-devel-4.12.14-lp151.28.7 is installed
OR kernel-macros-4.12.14-lp151.28.7 is installed
OR kernel-obs-build-4.12.14-lp151.28.7 is installed
OR kernel-obs-qa-4.12.14-lp151.28.7 is installed
OR kernel-source-4.12.14-lp151.28.7 is installed
OR kernel-source-vanilla-4.12.14-lp151.28.7 is installed
OR kernel-syms-4.12.14-lp151.28.7 is installed
OR kernel-vanilla-4.12.14-lp151.28.7 is installed
OR kernel-vanilla-base-4.12.14-lp151.28.7 is installed
OR kernel-vanilla-devel-4.12.14-lp151.28.7 is installed
|
Definition Synopsis |
openSUSE Leap 15.2 is installed
AND Package Information
grub2-2.04-lp152.7.3 is installed
OR grub2-branding-upstream-2.04-lp152.7.3 is installed
OR grub2-i386-efi-2.04-lp152.7.3 is installed
OR grub2-i386-efi-debug-2.04-lp152.7.3 is installed
OR grub2-i386-pc-2.04-lp152.7.3 is installed
OR grub2-i386-pc-debug-2.04-lp152.7.3 is installed
OR grub2-i386-xen-2.04-lp152.7.3 is installed
OR grub2-snapper-plugin-2.04-lp152.7.3 is installed
OR grub2-systemd-sleep-plugin-2.04-lp152.7.3 is installed
OR grub2-x86_64-efi-2.04-lp152.7.3 is installed
OR grub2-x86_64-efi-debug-2.04-lp152.7.3 is installed
OR grub2-x86_64-xen-2.04-lp152.7.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
libwireshark8-2.2.8-48.6 is installed
OR libwiretap6-2.2.8-48.6 is installed
OR libwscodecs1-2.2.8-48.6 is installed
OR libwsutil7-2.2.8-48.6 is installed
OR wireshark-2.2.8-48.6 is installed
OR wireshark-gtk-2.2.8-48.6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
glibc-2.22-62.22 is installed
OR glibc-32bit-2.22-62.22 is installed
OR glibc-devel-2.22-62.22 is installed
OR glibc-devel-32bit-2.22-62.22 is installed
OR glibc-html-2.22-62.22 is installed
OR glibc-i18ndata-2.22-62.22 is installed
OR glibc-info-2.22-62.22 is installed
OR glibc-locale-2.22-62.22 is installed
OR glibc-locale-32bit-2.22-62.22 is installed
OR glibc-profile-2.22-62.22 is installed
OR glibc-profile-32bit-2.22-62.22 is installed
OR nscd-2.22-62.22 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
kgraft-patch-4_4_180-94_103-default-4-2 is installed
OR kgraft-patch-SLE12-SP3_Update_28-4-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
kernel-default-4.4.180-94.103 is installed
OR kernel-default-base-4.4.180-94.103 is installed
OR kernel-default-devel-4.4.180-94.103 is installed
OR kernel-default-man-4.4.180-94.103 is installed
OR kernel-devel-4.4.180-94.103 is installed
OR kernel-macros-4.4.180-94.103 is installed
OR kernel-source-4.4.180-94.103 is installed
OR kernel-syms-4.4.180-94.103 is installed
OR kgraft-patch-4_4_180-94_103-default-1-4.3 is installed
OR kgraft-patch-SLE12-SP3_Update_28-1-4.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
libsndfile-1.0.25-36.16 is installed
OR libsndfile1-1.0.25-36.16 is installed
OR libsndfile1-32bit-1.0.25-36.16 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND apache2-mod_jk-1.2.40-5 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND Package Information
kernel-default-4.4.180-94.107 is installed
OR kernel-default-base-4.4.180-94.107 is installed
OR kernel-default-devel-4.4.180-94.107 is installed
OR kernel-default-kgraft-4.4.180-94.107 is installed
OR kernel-devel-4.4.180-94.107 is installed
OR kernel-macros-4.4.180-94.107 is installed
OR kernel-source-4.4.180-94.107 is installed
OR kernel-syms-4.4.180-94.107 is installed
OR kgraft-patch-4_4_180-94_107-default-1-4.3 is installed
OR kgraft-patch-SLE12-SP3_Update_29-1-4.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 9 is installed
AND python-Twisted-15.2.1-9.5 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
libopenssl-devel-1.0.2j-60.55 is installed
OR libopenssl1_0_0-1.0.2j-60.55 is installed
OR libopenssl1_0_0-32bit-1.0.2j-60.55 is installed
OR libopenssl1_0_0-hmac-1.0.2j-60.55 is installed
OR libopenssl1_0_0-hmac-32bit-1.0.2j-60.55 is installed
OR openssl-1.0.2j-60.55 is installed
OR openssl-doc-1.0.2j-60.55 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 9 is installed
AND Package Information
libjavascriptcoregtk-4_0-18-2.28.3-2.56 is installed
OR libwebkit2gtk-4_0-37-2.28.3-2.56 is installed
OR libwebkit2gtk3-lang-2.28.3-2.56 is installed
OR typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56 is installed
OR typelib-1_0-WebKit2-4_0-2.28.3-2.56 is installed
OR typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56 is installed
OR webkit2gtk-4_0-injected-bundles-2.28.3-2.56 is installed
OR webkit2gtk3-2.28.3-2.56 is installed
|