Revision Date: | 2022-02-10 | Version: | 1 |
Title: | Security update for the Linux Kernel (Critical) |
Description: |
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254). - CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207). - CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723). - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767). - CVE-2022-0322: Fixed SCTP issue with account stream padding length for reconf chunk (bsc#1194985). - CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new map's value in function nsim_bpf_map_alloc (bsc#1193927). - CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065). - CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864). - CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861). - CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880). - CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302). - CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529). - CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727). - CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
The following non-security bugs were fixed:
- KVM: remember position in kvm->vcpus array (bsc#1190973). - KVM: s390: index kvm->arch.idle_mask by vcpu_idx (bsc#1190973). - SUNRPC: Add basic load balancing to the transport switch - kabi fix. (bnc#1192729). - SUNRPC: Add basic load balancing to the transport switch. (bnc#1192729) - SUNRPC: Fix initialisation of struct rpc_xprt_switch (bnc#1192729). - SUNRPC: Optimise transport balancing code (bnc#1192729). - SUNRPC: Replace division by multiplication in calculation of queue length (bnc#1192729). - SUNRPC: Skip zero-refcount transports (bnc#1192729). - USB: serial: option: add Telit FN990 compositions (git-fixes). - bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227). - crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes). - ext4: set csum seed in tmp inode while migrating to extents (bsc#1195272). - fget: clarify and improve __fget_files() implementation (bsc#1193727). - hv_netvsc: Set needed_headroom according to VF (bsc#1193507). - ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713). - ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713). - ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713). - ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713). - kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190973). - kabi: mask new member 'empty' of struct Qdisc (bsc#1183405). - kabi: revert drop of Qdisc::atomic_qlen (bsc#1183405). - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669). - livepatch: Avoid CPU hogging with cond_resched (bsc#1071995). - memstick: rtsx_usb_ms: fix UAF (bsc#1194516). - mm/hwpoison: do not lock page again when me_huge_page() successfully recovers (bsc#1194814). - moxart: fix potential use-after-free on remove path (bsc#1194516). - net, xdp: Introduce xdp_init_buff utility routine (bsc#1193507). - net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193507). - net/sched: annotate lockless accesses to qdisc->empty (bsc#1183405). - net/sched: fix race between deactivation and dequeue for NOLOCK qdisc (bsc#1183405). - net/sched: pfifo_fast: fix wrong dereference in pfifo_fast_enqueue (bsc#1183405). - net/sched: pfifo_fast: fix wrong dereference when qdisc is reset (bsc#1183405). - net: Using proper atomic helper (bsc#1186222). - net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428). - net: caif: avoid using qdisc_qlen() (bsc#1183405). - net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes). - net: dev: introduce support for sch BYPASS for lockless qdisc (bsc#1183405). - net: mana: Add RX fencing (bsc#1193507). - net: mana: Add XDP support (bsc#1193507). - net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405). - net: sched: Avoid using yield() in a busy waiting loop (bsc#1183405). - net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405). - net: sched: add empty status flag for NOLOCK qdisc (bsc#1183405). - net: sched: always do stats accounting according to TCQ_F_CPUSTATS (bsc#1183405). - net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405). - net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405). - net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405). - net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405). - net: sched: prefer qdisc_is_empty() over direct qlen access (bsc#1183405). - net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405). - net: sched: when clearing NOLOCK, clear TCQ_F_CPUSTATS, too (bsc#1183405). - net: tipc: validate domain record count on input (bsc#1195254). - net: usb: lan78xx: add Allied Telesis AT29M2-AF (git-fixes). - net_sched: avoid resetting active qdisc for multiple times (bsc#1183405). - net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405). - net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405). - nfs: do not dirty kernel pages read by direct-io (bsc#1194410). - nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096). - nvme: return BLK_STS_TRANSPORT unless DNR for NVME_SC_NS_NOT_READY (bsc#1163405). - of: Add cpu node iterator for_each_of_cpu_node() (bsc#1065729). - of: Add device_type access helper functions (bsc#1065729). - of: Fix cpu node iterator to not ignore disabled cpu nodes (bsc#1065729). - of: Fix property name in of_node_get_device_type (bsc#1065729). - of: add node name compare helper functions (bsc#1065729). - powerpc/perf: Fix data source encodings for L2.1 and L3.1 accesses (bsc#1065729). - powerpc/prom_init: Fix improper check of prom_getprop() (bsc#1065729). - powerpc/pseries/cpuhp: cache node corrections (bsc#1065729). - powerpc/pseries/cpuhp: delete add/remove_by_count code (bsc#1065729). - powerpc/pseries/mobility: ignore ibm, platform-facilities updates (bsc#1065729). - powerpc/traps: do not enable irqs in _exception (bsc#1065729). - powerpc: add interrupt_cond_local_irq_enable helper (bsc#1065729). - s390/cio: make ccw_device_dma_* more robust (bsc#1193242). - s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193234). - s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194965). - select: Fix indefinitely sleeping task in poll_schedule_timeout() (bsc#1194027). - tpm: Check for integer overflow in tpm2_map_response_body() (bsc#1082555). - tpm: add request_locality before write TPM_INT_ENABLE (bsc#1082555). - tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634). - tracing/kprobes: 'nmissed' not showed correctly for kretprobe (git-fixes). - tracing: Fix check for trace_percpu_buffer validity in get_trace_buf() (git-fixes). - ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes). - usb: core: config: fix validation of wMaxPacketValue entries (git-fixes). - usbnet: fix error return code in usbnet_probe() (git-fixes). - usbnet: sanity check for maxpacket (git-fixes). - vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888). - virtio: write back F_VERSION_1 before validate (bsc#1193235). - x86/platform/uv: Add more to secondary CPU kdump info (bsc#1194493).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1065729 1071995 1082555 1163405 1177599 1183405 1184209 1184735 1184739 1186207 1186222 1187428 1187723 1188605 1190973 1192729 1193096 1193234 1193235 1193242 1193507 1193660 1193669 1193727 1193767 1193861 1193864 1193927 1194001 1194027 1194227 1194302 1194410 1194493 1194516 1194529 1194814 1194880 1194888 1194965 1194985 1195065 1195073 1195254 1195272 CVE-2008-5913 CVE-2009-0040 CVE-2009-0652 CVE-2009-0771 CVE-2009-0772 CVE-2009-0773 CVE-2009-0774 CVE-2009-0775 CVE-2009-0776 CVE-2009-0777 CVE-2009-1044 CVE-2009-1169 CVE-2009-1302 CVE-2009-1303 CVE-2009-1304 CVE-2009-1305 CVE-2009-1306 CVE-2009-1307 CVE-2009-1308 CVE-2009-1309 CVE-2009-1310 CVE-2009-1311 CVE-2009-1312 CVE-2009-1313 CVE-2009-1563 CVE-2009-1885 CVE-2009-2470 CVE-2009-2654 CVE-2009-3069 CVE-2009-3070 CVE-2009-3071 CVE-2009-3072 CVE-2009-3073 CVE-2009-3074 CVE-2009-3075 CVE-2009-3077 CVE-2009-3078 CVE-2009-3079 CVE-2009-3274 CVE-2009-3370 CVE-2009-3371 CVE-2009-3372 CVE-2009-3373 CVE-2009-3374 CVE-2009-3375 CVE-2009-3376 CVE-2009-3377 CVE-2009-3378 CVE-2009-3379 CVE-2009-3380 CVE-2009-3381 CVE-2009-3383 CVE-2009-3388 CVE-2009-3389 CVE-2009-3555 CVE-2009-3979 CVE-2009-3980 CVE-2009-3982 CVE-2009-3983 CVE-2009-3984 CVE-2009-3985 CVE-2010-0164 CVE-2010-0165 CVE-2010-0166 CVE-2010-0167 CVE-2010-0168 CVE-2010-0169 CVE-2010-0170 CVE-2010-0171 CVE-2010-0172 CVE-2010-0173 CVE-2010-0174 CVE-2010-0176 CVE-2010-0177 CVE-2010-0178 CVE-2010-0181 CVE-2010-0182 CVE-2010-0654 CVE-2010-1028 CVE-2010-1121 CVE-2010-1125 CVE-2010-1196 CVE-2010-1197 CVE-2010-1198 CVE-2010-1199 CVE-2010-1200 CVE-2010-1201 CVE-2010-1202 CVE-2010-1203 CVE-2010-1205 CVE-2010-1206 CVE-2010-1207 CVE-2010-1208 CVE-2010-1209 CVE-2010-1210 CVE-2010-1211 CVE-2010-1212 CVE-2010-1213 CVE-2010-1214 CVE-2010-1215 CVE-2010-2751 CVE-2010-2752 CVE-2010-2753 CVE-2010-2754 CVE-2010-2755 CVE-2010-2760 CVE-2010-2762 CVE-2010-2764 CVE-2010-2765 CVE-2010-2766 CVE-2010-2767 CVE-2010-2768 CVE-2010-2769 CVE-2010-3166 CVE-2010-3167 CVE-2010-3168 CVE-2010-3169 CVE-2010-3170 CVE-2010-3173 CVE-2010-3174 CVE-2010-3175 CVE-2010-3176 CVE-2010-3177 CVE-2010-3178 CVE-2010-3179 CVE-2010-3180 CVE-2010-3182 CVE-2010-3183 CVE-2010-3765 CVE-2010-4530 CVE-2011-0068 CVE-2011-0069 CVE-2011-0070 CVE-2011-0079 CVE-2011-0080 CVE-2011-0081 CVE-2011-0084 CVE-2011-1187 CVE-2011-1202 CVE-2011-2366 CVE-2011-2367 CVE-2011-2368 CVE-2011-2369 CVE-2011-2370 CVE-2011-2371 CVE-2011-2372 CVE-2011-2373 CVE-2011-2374 CVE-2011-2375 CVE-2011-2377 CVE-2011-2483 CVE-2011-2513 CVE-2011-2514 CVE-2011-2985 CVE-2011-2986 CVE-2011-2988 CVE-2011-2989 CVE-2011-2990 CVE-2011-2991 CVE-2011-2992 CVE-2011-2993 CVE-2011-2995 CVE-2011-2996 CVE-2011-2997 CVE-2011-3000 CVE-2011-3001 CVE-2011-3002 CVE-2011-3003 CVE-2011-3004 CVE-2011-3005 CVE-2011-3026 CVE-2011-3062 CVE-2011-3101 CVE-2011-3232 CVE-2011-3377 CVE-2011-3648 CVE-2011-3650 CVE-2011-3651 CVE-2011-3652 CVE-2011-3654 CVE-2011-3655 CVE-2011-3658 CVE-2011-3659 CVE-2011-3660 CVE-2011-3661 CVE-2011-3663 CVE-2012-0441 CVE-2012-0442 CVE-2012-0443 CVE-2012-0444 CVE-2012-0445 CVE-2012-0446 CVE-2012-0447 CVE-2012-0449 CVE-2012-0451 CVE-2012-0452 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0463 CVE-2012-0464 CVE-2012-0467 CVE-2012-0468 CVE-2012-0469 CVE-2012-0470 CVE-2012-0471 CVE-2012-0472 CVE-2012-0473 CVE-2012-0474 CVE-2012-0475 CVE-2012-0477 CVE-2012-0478 CVE-2012-0479 CVE-2012-0759 CVE-2012-1937 CVE-2012-1938 CVE-2012-1940 CVE-2012-1941 CVE-2012-1944 CVE-2012-1945 CVE-2012-1946 CVE-2012-1947 CVE-2012-1948 CVE-2012-1949 CVE-2012-1950 CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 CVE-2012-1955 CVE-2012-1956 CVE-2012-1957 CVE-2012-1958 CVE-2012-1959 CVE-2012-1960 CVE-2012-1961 CVE-2012-1962 CVE-2012-1963 CVE-2012-1965 CVE-2012-1966 CVE-2012-1967 CVE-2012-1970 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974 CVE-2012-1975 CVE-2012-1976 CVE-2012-3355 CVE-2012-3422 CVE-2012-3423 CVE-2012-3956 CVE-2012-3957 CVE-2012-3958 CVE-2012-3959 CVE-2012-3960 CVE-2012-3961 CVE-2012-3962 CVE-2012-3963 CVE-2012-3964 CVE-2012-3965 CVE-2012-3966 CVE-2012-3967 CVE-2012-3968 CVE-2012-3969 CVE-2012-3970 CVE-2012-3971 CVE-2012-3972 CVE-2012-3973 CVE-2012-3975 CVE-2012-3976 CVE-2012-3978 CVE-2012-3980 CVE-2012-3982 CVE-2012-3983 CVE-2012-3984 CVE-2012-3985 CVE-2012-3986 CVE-2012-3988 CVE-2012-3989 CVE-2012-3990 CVE-2012-3991 CVE-2012-3992 CVE-2012-3993 CVE-2012-3994 CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 CVE-2012-4184 CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 CVE-2012-4201 CVE-2012-4202 CVE-2012-4203 CVE-2012-4204 CVE-2012-4205 CVE-2012-4207 CVE-2012-4208 CVE-2012-4209 CVE-2012-4210 CVE-2012-4212 CVE-2012-4213 CVE-2012-4214 CVE-2012-4215 CVE-2012-4216 CVE-2012-4217 CVE-2012-4218 CVE-2012-4540 CVE-2012-5829 CVE-2012-5830 CVE-2012-5833 CVE-2012-5835 CVE-2012-5836 CVE-2012-5837 CVE-2012-5838 CVE-2012-5839 CVE-2012-5840 CVE-2012-5841 CVE-2012-5842 CVE-2012-5843 CVE-2013-0221 CVE-2013-0222 CVE-2013-0223 CVE-2013-0743 CVE-2013-0744 CVE-2013-0745 CVE-2013-0746 CVE-2013-0747 CVE-2013-0748 CVE-2013-0749 CVE-2013-0750 CVE-2013-0751 CVE-2013-0752 CVE-2013-0753 CVE-2013-0754 CVE-2013-0755 CVE-2013-0756 CVE-2013-0757 CVE-2013-0758 CVE-2013-0760 CVE-2013-0761 CVE-2013-0762 CVE-2013-0763 CVE-2013-0764 CVE-2013-0765 CVE-2013-0766 CVE-2013-0767 CVE-2013-0768 CVE-2013-0769 CVE-2013-0770 CVE-2013-0771 CVE-2013-0772 CVE-2013-0773 CVE-2013-0774 CVE-2013-0775 CVE-2013-0776 CVE-2013-0777 CVE-2013-0778 CVE-2013-0779 CVE-2013-0780 CVE-2013-0781 CVE-2013-0782 CVE-2013-0783 CVE-2013-0787 CVE-2013-0788 CVE-2013-0789 CVE-2013-0792 CVE-2013-0793 CVE-2013-0794 CVE-2013-0795 CVE-2013-0796 CVE-2013-0800 CVE-2013-0801 CVE-2013-1669 CVE-2013-1670 CVE-2013-1671 CVE-2013-1674 CVE-2013-1675 CVE-2013-1676 CVE-2013-1677 CVE-2013-1678 CVE-2013-1679 CVE-2013-1680 CVE-2013-1681 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1688 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1695 CVE-2013-1696 CVE-2013-1697 CVE-2013-1698 CVE-2013-1699 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1708 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 CVE-2013-1718 CVE-2013-1719 CVE-2013-1720 CVE-2013-1721 CVE-2013-1722 CVE-2013-1723 CVE-2013-1724 CVE-2013-1725 CVE-2013-1728 CVE-2013-1730 CVE-2013-1732 CVE-2013-1735 CVE-2013-1736 CVE-2013-1737 CVE-2013-1738 CVE-2013-1926 CVE-2013-1927 CVE-2013-1981 CVE-2013-1997 CVE-2013-2004 CVE-2013-2063 CVE-2013-2126 CVE-2013-2127 CVE-2013-4349 CVE-2013-5590 CVE-2013-5591 CVE-2013-5592 CVE-2013-5593 CVE-2013-5595 CVE-2013-5596 CVE-2013-5597 CVE-2013-5598 CVE-2013-5599 CVE-2013-5600 CVE-2013-5601 CVE-2013-5602 CVE-2013-5603 CVE-2013-5604 CVE-2013-5609 CVE-2013-5610 CVE-2013-5611 CVE-2013-5612 CVE-2013-5613 CVE-2013-5614 CVE-2013-5615 CVE-2013-5616 CVE-2013-5618 CVE-2013-5619 CVE-2013-6629 CVE-2013-6630 CVE-2013-6671 CVE-2013-6672 CVE-2013-6673 CVE-2014-1477 CVE-2014-1478 CVE-2014-1479 CVE-2014-1480 CVE-2014-1481 CVE-2014-1482 CVE-2014-1483 CVE-2014-1484 CVE-2014-1485 CVE-2014-1486 CVE-2014-1487 CVE-2014-1488 CVE-2014-1489 CVE-2014-1490 CVE-2014-1491 CVE-2014-1544 CVE-2014-1547 CVE-2014-1548 CVE-2014-1553 CVE-2014-1554 CVE-2014-1555 CVE-2014-1556 CVE-2014-1557 CVE-2014-1562 CVE-2014-1563 CVE-2014-1564 CVE-2014-1565 CVE-2014-1567 CVE-2014-1574 CVE-2014-1575 CVE-2014-1576 CVE-2014-1577 CVE-2014-1578 CVE-2014-1581 CVE-2014-1583 CVE-2014-1585 CVE-2014-1586 CVE-2014-1587 CVE-2014-1588 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 CVE-2014-1594 CVE-2014-3158 CVE-2014-8634 CVE-2014-8635 CVE-2014-8638 CVE-2014-8639 CVE-2014-8641 CVE-2015-0252 CVE-2015-0797 CVE-2015-0801 CVE-2015-0807 CVE-2015-0813 CVE-2015-0814 CVE-2015-0815 CVE-2015-0816 CVE-2015-0817 CVE-2015-0818 CVE-2015-0822 CVE-2015-0827 CVE-2015-0831 CVE-2015-0835 CVE-2015-0836 CVE-2015-2708 CVE-2015-2709 CVE-2015-2710 CVE-2015-2713 CVE-2015-2716 CVE-2015-2721 CVE-2015-2722 CVE-2015-2724 CVE-2015-2725 CVE-2015-2726 CVE-2015-2728 CVE-2015-2730 CVE-2015-2733 CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737 CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 CVE-2015-2743 CVE-2015-3310 CVE-2015-3885 CVE-2015-4000 CVE-2015-4041 CVE-2015-4042 CVE-2015-4473 CVE-2015-4474 CVE-2015-4475 CVE-2015-4478 CVE-2015-4479 CVE-2015-4484 CVE-2015-4485 CVE-2015-4486 CVE-2015-4487 CVE-2015-4488 CVE-2015-4489 CVE-2015-4491 CVE-2015-4492 CVE-2015-4495 CVE-2015-4497 CVE-2015-4498 CVE-2015-4500 CVE-2015-4501 CVE-2015-4506 CVE-2015-4509 CVE-2015-4511 CVE-2015-4513 CVE-2015-4517 CVE-2015-4519 CVE-2015-4520 CVE-2015-4521 CVE-2015-4522 CVE-2015-5185 CVE-2015-5234 CVE-2015-5235 CVE-2015-7174 CVE-2015-7175 CVE-2015-7176 CVE-2015-7177 CVE-2015-7180 CVE-2015-7181 CVE-2015-7182 CVE-2015-7183 CVE-2015-7188 CVE-2015-7189 CVE-2015-7193 CVE-2015-7194 CVE-2015-7196 CVE-2015-7197 CVE-2015-7198 CVE-2015-7199 CVE-2015-7200 CVE-2015-7201 CVE-2015-7202 CVE-2015-7205 CVE-2015-7210 CVE-2015-7212 CVE-2015-7213 CVE-2015-7214 CVE-2015-7222 CVE-2015-8367 CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172 CVE-2016-10196 CVE-2016-1523 CVE-2016-1930 CVE-2016-1931 CVE-2016-1935 CVE-2016-1950 CVE-2016-1952 CVE-2016-1953 CVE-2016-1954 CVE-2016-1957 CVE-2016-1958 CVE-2016-1960 CVE-2016-1961 CVE-2016-1962 CVE-2016-1964 CVE-2016-1965 CVE-2016-1966 CVE-2016-1974 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800 CVE-2016-2801 CVE-2016-2802 CVE-2016-2805 CVE-2016-2807 CVE-2016-2808 CVE-2016-2814 CVE-2016-2815 CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2824 CVE-2016-2828 CVE-2016-2830 CVE-2016-2831 CVE-2016-2835 CVE-2016-2836 CVE-2016-2837 CVE-2016-2838 CVE-2016-2839 CVE-2016-5104 CVE-2016-5250 CVE-2016-5252 CVE-2016-5254 CVE-2016-5257 CVE-2016-5258 CVE-2016-5259 CVE-2016-5261 CVE-2016-5262 CVE-2016-5263 CVE-2016-5264 CVE-2016-5265 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 CVE-2016-5290 CVE-2016-5291 CVE-2016-5296 CVE-2016-5297 CVE-2016-6354 CVE-2016-7942 CVE-2016-7951 CVE-2016-7952 CVE-2016-9064 CVE-2016-9066 CVE-2016-9079 CVE-2016-9893 CVE-2016-9895 CVE-2016-9897 CVE-2016-9898 CVE-2016-9899 CVE-2016-9900 CVE-2016-9901 CVE-2016-9902 CVE-2016-9904 CVE-2016-9905 CVE-2017-13735 CVE-2017-13738 CVE-2017-13739 CVE-2017-13740 CVE-2017-13741 CVE-2017-13743 CVE-2017-13744 CVE-2017-14608 CVE-2017-16909 CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 CVE-2017-5378 CVE-2017-5380 CVE-2017-5383 CVE-2017-5386 CVE-2017-5390 CVE-2017-5396 CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5409 CVE-2017-5410 CVE-2017-5429 CVE-2017-5430 CVE-2017-5432 CVE-2017-5433 CVE-2017-5434 CVE-2017-5435 CVE-2017-5436 CVE-2017-5437 CVE-2017-5438 CVE-2017-5439 CVE-2017-5440 CVE-2017-5441 CVE-2017-5442 CVE-2017-5443 CVE-2017-5444 CVE-2017-5445 CVE-2017-5446 CVE-2017-5447 CVE-2017-5448 CVE-2017-5449 CVE-2017-5451 CVE-2017-5454 CVE-2017-5455 CVE-2017-5456 CVE-2017-5459 CVE-2017-5460 CVE-2017-5461 CVE-2017-5462 CVE-2017-5464 CVE-2017-5465 CVE-2017-5466 CVE-2017-5467 CVE-2017-5469 CVE-2017-5470 CVE-2017-5472 CVE-2017-6886 CVE-2017-6887 CVE-2017-6890 CVE-2017-6899 CVE-2017-7749 CVE-2017-7750 CVE-2017-7751 CVE-2017-7752 CVE-2017-7753 CVE-2017-7754 CVE-2017-7755 CVE-2017-7756 CVE-2017-7757 CVE-2017-7758 CVE-2017-7761 CVE-2017-7763 CVE-2017-7764 CVE-2017-7765 CVE-2017-7768 CVE-2017-7778 CVE-2017-7779 CVE-2017-7782 CVE-2017-7784 CVE-2017-7785 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792 CVE-2017-7793 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 CVE-2017-7803 CVE-2017-7804 CVE-2017-7805 CVE-2017-7807 CVE-2017-7810 CVE-2017-7814 CVE-2017-7818 CVE-2017-7819 CVE-2017-7823 CVE-2017-7824 CVE-2017-7825 CVE-2017-7826 CVE-2017-7828 CVE-2017-7830 CVE-2018-11440 CVE-2018-11577 CVE-2018-11683 CVE-2018-11684 CVE-2018-11685 CVE-2018-12085 CVE-2018-12359 CVE-2018-12360 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366 CVE-2018-12368 CVE-2018-14598 CVE-2018-14599 CVE-2018-14600 CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117 CVE-2018-5125 CVE-2018-5127 CVE-2018-5129 CVE-2018-5130 CVE-2018-5131 CVE-2018-5144 CVE-2018-5145 CVE-2018-5146 CVE-2018-5147 CVE-2018-5148 CVE-2018-5150 CVE-2018-5154 CVE-2018-5155 CVE-2018-5156 CVE-2018-5157 CVE-2018-5158 CVE-2018-5159 CVE-2018-5168 CVE-2018-5174 CVE-2018-5178 CVE-2018-5183 CVE-2018-5188 CVE-2018-5800 CVE-2018-5801 CVE-2018-5802 CVE-2018-5810 CVE-2018-5813 CVE-2018-6126 CVE-2020-28097 CVE-2021-3497 CVE-2021-3498 CVE-2021-3564 CVE-2021-39648 CVE-2021-39657 CVE-2021-4083 CVE-2021-4135 CVE-2021-4149 CVE-2021-4197 CVE-2021-4202 CVE-2021-44733 CVE-2022-0322 CVE-2022-0330 CVE-2022-0435 CVE-2022-22942 SUSE-SU-2022:0364-1
|
Platform(s): | openSUSE 13.1 openSUSE 13.1 NonFree openSUSE 13.2 openSUSE 13.2 NonFree openSUSE Leap 42.1 SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 SUSE Linux Enterprise Build System Kit 12 SUSE Linux Enterprise Build System Kit 12 SP1 SUSE Linux Enterprise Build System Kit 12 SP2 SUSE Linux Enterprise Build System Kit 12 SP3 SUSE Linux Enterprise Build System Kit 12 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 12 SUSE Linux Enterprise Desktop 12 SP1 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise Desktop 12 SP4 SUSE Linux Enterprise for SAP 12 SUSE Linux Enterprise for SAP 12 SP1 SUSE Linux Enterprise High Availability 12 SP2 SUSE Linux Enterprise High Availability 12 SP3 SUSE Linux Enterprise High Performance Computing 12 SP5 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Live Patching 12 SP3 SUSE Linux Enterprise Module for Advanced Systems Management 12 SUSE Linux Enterprise Module for Containers 12 SUSE Linux Enterprise Module for Legacy Software 12 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP3-LTSS SUSE Linux Enterprise Server 11 SP4 SUSE Linux Enterprise Server 11-SECURITY SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 SUSE Linux Enterprise Server for SAP Applications 12 SP2 SUSE Linux Enterprise Server for SAP Applications 12 SP5 SUSE Linux Enterprise Server for VMWare 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP4 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Software Development Kit 12 SP1 SUSE Linux Enterprise Software Development Kit 12 SP2 SUSE Linux Enterprise Software Development Kit 12 SP3 SUSE Linux Enterprise Workstation Extension 12 SP4
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Build System Kit 12 is installed AND kernel-zfcpdump-3.12.44-52.10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Build System Kit 12 SP1 is installed
AND Package Information
ocaml-4.02.3-6.6 is installed
OR ocaml-ocamldoc-4.02.3-6.6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Build System Kit 12 SP2 is installed
AND Package Information
ghostscript-mini-9.15-17 is installed
OR ghostscript-mini-devel-9.15-17 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Build System Kit 12 SP3 is installed
AND Package Information
libudev-mini-devel-228-150.9 is installed
OR libudev-mini1-228-150.9 is installed
OR systemd-mini-228-150.9 is installed
OR systemd-mini-devel-228-150.9 is installed
OR udev-mini-228-150.9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Build System Kit 12 SP4 is installed
AND Package Information
libudev-mini-devel-228-150.53 is installed
OR libudev-mini1-228-150.53 is installed
OR systemd-mini-228-150.53 is installed
OR systemd-mini-devel-228-150.53 is installed
OR udev-mini-228-150.53 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP2 is installed
AND Package Information
MozillaFirefox-17.0.9esr-0.3.1 is installed
OR MozillaFirefox-translations-17.0.9esr-0.3.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP3 is installed
AND Package Information
MozillaFirefox-24.5.0esr-0.8.1 is installed
OR MozillaFirefox-branding-SLED-24-0.7.36 is installed
OR MozillaFirefox-translations-24.5.0esr-0.8.1 is installed
OR libfreebl3-3.16-0.8.1 is installed
OR libfreebl3-32bit-3.16-0.8.1 is installed
OR libsoftokn3-3.16-0.8.1 is installed
OR libsoftokn3-32bit-3.16-0.8.1 is installed
OR mozilla-nspr-4.10.4-0.3.1 is installed
OR mozilla-nspr-32bit-4.10.4-0.3.1 is installed
OR mozilla-nss-3.16-0.8.1 is installed
OR mozilla-nss-32bit-3.16-0.8.1 is installed
OR mozilla-nss-tools-3.16-0.8.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed
AND Package Information
dbus-1-1.8.12-6 is installed
OR dbus-1-x11-1.8.12-6 is installed
OR libdbus-1-3-1.8.12-6 is installed
OR libdbus-1-3-32bit-1.8.12-6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP1 is installed
AND Package Information
libxerces-c-3_1-3.1.1-4 is installed
OR libxerces-c-3_1-32bit-3.1.1-4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND ppp-2.4.7-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP4 is installed
AND Package Information
MozillaFirefox-52.9.0esr-109.38 is installed
OR MozillaFirefox-translations-52.9.0esr-109.38 is installed
|
Definition Synopsis |
SUSE Linux Enterprise for SAP 12 is installed
AND Package Information
libspice-server1-0.12.4-8.15 is installed
OR spice-0.12.4-8.15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise for SAP 12 SP1 is installed
AND Package Information
compat-openssl098-0.9.8j-97.1 is installed
OR libopenssl0_9_8-0.9.8j-97.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP2 is installed
AND haproxy-1.6.5-5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP3 is installed
AND libpcreposix0-8.39-7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Performance Computing 12 SP5 is installed
AND apache2-mod_jk-1.2.40-7.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Live Patching 12 is installed
AND Package Information
kgraft-patch-3_12_51-60_25-default-5-2 is installed
OR kgraft-patch-3_12_51-60_25-xen-5-2 is installed
OR kgraft-patch-SLE12-SP1_Update_2-5-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Live Patching 12 SP3 is installed
AND Package Information
kgraft-patch-4_4_103-6_33-default-1-4.3 is installed
OR kgraft-patch-SLE12-SP3_Update_6-1-4.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Advanced Systems Management 12 is installed
AND Package Information
salt-2016.11.4-46.7 is installed
OR salt-api-2016.11.4-46.7 is installed
OR salt-bash-completion-2016.11.4-46.7 is installed
OR salt-cloud-2016.11.4-46.7 is installed
OR salt-doc-2016.11.4-46.7 is installed
OR salt-master-2016.11.4-46.7 is installed
OR salt-minion-2016.11.4-46.7 is installed
OR salt-proxy-2016.11.4-46.7 is installed
OR salt-ssh-2016.11.4-46.7 is installed
OR salt-syndic-2016.11.4-46.7 is installed
OR salt-zsh-completion-2016.11.4-46.7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Containers 12 is installed
AND sles12sp1-docker-image-1.0.4-20160308170633 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Legacy Software 12 is installed
AND Package Information
java-1_6_0-ibm-1.6.0_sr16.1-5 is installed
OR java-1_6_0-ibm-fonts-1.6.0_sr16.1-5 is installed
OR java-1_6_0-ibm-jdbc-1.6.0_sr16.1-5 is installed
OR java-1_6_0-ibm-plugin-1.6.0_sr16.1-5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Public Cloud 12 is installed
AND Package Information
kernel-ec2-3.12.38-44 is installed
OR kernel-ec2-devel-3.12.38-44 is installed
OR kernel-ec2-extra-3.12.38-44 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP1 is installed
AND Package Information
PackageKit-0.3.14-2.12.105 is installed
OR PackageKit-lang-0.3.14-2.12.105 is installed
OR hal-0.5.12-23.40.5 is installed
OR hal-32bit-0.5.12-23.40.5 is installed
OR hal-doc-0.5.12-23.40.6 is installed
OR hal-x86-0.5.12-23.40.5 is installed
OR libpackagekit-glib10-0.3.14-2.12.105 is installed
OR yast2-core-2.17.35-0.2.17 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP2 is installed
AND NetworkManager-gnome-0.7.1-5.22.28 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP3 is installed
AND
libmysql55client18-5.5.45-0.11.1 is installed
OR libmysql55client18-32bit-5.5.45-0.11.1 is installed
OR libmysql55client18-x86-5.5.45-0.11.1 is installed
OR libmysql55client_r18-5.5.45-0.11.1 is installed
OR mysql-5.5.45-0.11.1 is installed
OR mysql-client-5.5.45-0.11.1 is installed
OR mysql-tools-5.5.45-0.11.1 is installed
OR Package Information
SUSE Linux Enterprise Server for VMWare 11 SP3 is installed
AND
libmysql55client18-5.5.45-0.11.1 is installed
OR libmysql55client18-32bit-5.5.45-0.11.1 is installed
OR libmysql55client18-x86-5.5.45-0.11.1 is installed
OR libmysql55client_r18-5.5.45-0.11.1 is installed
OR mysql-5.5.45-0.11.1 is installed
OR mysql-client-5.5.45-0.11.1 is installed
OR mysql-tools-5.5.45-0.11.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3 is installed
AND hyper-v-5-0.7.10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3-LTSS is installed
AND Package Information
curl-7.19.7-1.61.1 is installed
OR libcurl4-7.19.7-1.61.1 is installed
OR libcurl4-32bit-7.19.7-1.61.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP4 is installed
AND Package Information
dhcpcd-3.2.3-44.30.1 is installed
OR dhcpv6-1.0.22-3.21.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11-SECURITY is installed
AND Package Information
libldap-openssl1-2_4-2-2.4.26-0.62.3 is installed
OR libldap-openssl1-2_4-2-32bit-2.4.26-0.62.3 is installed
OR libldap-openssl1-2_4-2-x86-2.4.26-0.62.3 is installed
OR openldap2-client-openssl1-2.4.26-0.62.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 is installed
AND hardlink-1.0-6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND libXxf86dga1-1.1.4-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
bash-4.3-78 is installed
OR bash-doc-4.3-78 is installed
OR libreadline6-6.3-78 is installed
OR libreadline6-32bit-6.3-78 is installed
OR readline-doc-6.3-78 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
at-3.1.14-7 is installed
OR flex-2.5.37-8 is installed
OR flex-32bit-2.5.37-8 is installed
OR libQtWebKit4-4.8.6+2.3.3-3 is installed
OR libQtWebKit4-32bit-4.8.6+2.3.3-3 is installed
OR libbonobo-2.32.1-16 is installed
OR libbonobo-32bit-2.32.1-16 is installed
OR libbonobo-doc-2.32.1-16 is installed
OR libbonobo-lang-2.32.1-16 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP5 is installed
AND
kernel-default-4.12.14-122.110.1 is installed
OR kernel-default-base-4.12.14-122.110.1 is installed
OR kernel-default-devel-4.12.14-122.110.1 is installed
OR kernel-default-man-4.12.14-122.110.1 is installed
OR kernel-devel-4.12.14-122.110.1 is installed
OR kernel-macros-4.12.14-122.110.1 is installed
OR kernel-source-4.12.14-122.110.1 is installed
OR kernel-syms-4.12.14-122.110.1 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP5 is installed
AND
kernel-default-4.12.14-122.110.1 is installed
OR kernel-default-base-4.12.14-122.110.1 is installed
OR kernel-default-devel-4.12.14-122.110.1 is installed
OR kernel-default-man-4.12.14-122.110.1 is installed
OR kernel-devel-4.12.14-122.110.1 is installed
OR kernel-macros-4.12.14-122.110.1 is installed
OR kernel-source-4.12.14-122.110.1 is installed
OR kernel-syms-4.12.14-122.110.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
AND Package Information
libpython3_4m1_0-3.4.1-12 is installed
OR python3-base-3.4.1-12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 12 SP2 is installed
AND Package Information
kgraft-patch-4_4_121-92_109-default-2-2 is installed
OR kgraft-patch-SLE12-SP2_Update_29-2-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
AND Package Information
GraphicsMagick-1.2.5-4.33.1 is installed
OR libGraphicsMagick2-1.2.5-4.33.1 is installed
OR perl-GraphicsMagick-1.2.5-4.33.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
AND Package Information
MozillaFirefox-31.8.0esr-0.10.1 is installed
OR MozillaFirefox-devel-31.8.0esr-0.10.1 is installed
OR mozilla-nspr-4.10.8-0.5.1 is installed
OR mozilla-nspr-devel-4.10.8-0.5.1 is installed
OR mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed
OR mozilla-nss-devel-3.19.2_CKBI_1.98-0.10.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
AND Package Information
kdelibs3-32bit-3.5.10-23.27.1 is installed
OR kdelibs3-arts-3.5.10-23.27.1 is installed
OR kdelibs3-arts-32bit-3.5.10-23.27.1 is installed
OR kdelibs3-arts-x86-3.5.10-23.27.1 is installed
OR kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed
OR kdelibs3-devel-3.5.10-23.27.1 is installed
OR kdelibs3-doc-3.5.10-23.27.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 is installed
AND MozillaFirefox-devel-31.1.0esr-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
AND automake-1.13.4-4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
AND LibVNCServer-devel-0.9.9-16 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
AND audiofile-devel-0.3.6-10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP4 is installed
AND Package Information
libsilc-1_1-2-1.1.10-24 is installed
OR libsilcclient-1_1-3-1.1.10-24 is installed
OR silc-toolkit-1.1.10-24 is installed
|