Oval Definition:oval:org.opensuse.security:def:6158
Revision Date:2022-02-10Version:1
Title:Security update for the Linux Kernel (Critical)
Description:



The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.



The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254). - CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207). - CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723). - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767). - CVE-2022-0322: Fixed SCTP issue with account stream padding length for reconf chunk (bsc#1194985). - CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new map's value in function nsim_bpf_map_alloc (bsc#1193927). - CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065). - CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864). - CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861). - CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880). - CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302). - CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529). - CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727). - CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).



The following non-security bugs were fixed:

- KVM: remember position in kvm->vcpus array (bsc#1190973). - KVM: s390: index kvm->arch.idle_mask by vcpu_idx (bsc#1190973). - SUNRPC: Add basic load balancing to the transport switch - kabi fix. (bnc#1192729). - SUNRPC: Add basic load balancing to the transport switch. (bnc#1192729) - SUNRPC: Fix initialisation of struct rpc_xprt_switch (bnc#1192729). - SUNRPC: Optimise transport balancing code (bnc#1192729). - SUNRPC: Replace division by multiplication in calculation of queue length (bnc#1192729). - SUNRPC: Skip zero-refcount transports (bnc#1192729). - USB: serial: option: add Telit FN990 compositions (git-fixes). - bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227). - crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes). - ext4: set csum seed in tmp inode while migrating to extents (bsc#1195272). - fget: clarify and improve __fget_files() implementation (bsc#1193727). - hv_netvsc: Set needed_headroom according to VF (bsc#1193507). - ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713). - ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713). - ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713). - ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713). - kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190973). - kabi: mask new member 'empty' of struct Qdisc (bsc#1183405). - kabi: revert drop of Qdisc::atomic_qlen (bsc#1183405). - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669). - livepatch: Avoid CPU hogging with cond_resched (bsc#1071995). - memstick: rtsx_usb_ms: fix UAF (bsc#1194516). - mm/hwpoison: do not lock page again when me_huge_page() successfully recovers (bsc#1194814). - moxart: fix potential use-after-free on remove path (bsc#1194516). - net, xdp: Introduce xdp_init_buff utility routine (bsc#1193507). - net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193507). - net/sched: annotate lockless accesses to qdisc->empty (bsc#1183405). - net/sched: fix race between deactivation and dequeue for NOLOCK qdisc (bsc#1183405). - net/sched: pfifo_fast: fix wrong dereference in pfifo_fast_enqueue (bsc#1183405). - net/sched: pfifo_fast: fix wrong dereference when qdisc is reset (bsc#1183405). - net: Using proper atomic helper (bsc#1186222). - net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428). - net: caif: avoid using qdisc_qlen() (bsc#1183405). - net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes). - net: dev: introduce support for sch BYPASS for lockless qdisc (bsc#1183405). - net: mana: Add RX fencing (bsc#1193507). - net: mana: Add XDP support (bsc#1193507). - net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405). - net: sched: Avoid using yield() in a busy waiting loop (bsc#1183405). - net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405). - net: sched: add empty status flag for NOLOCK qdisc (bsc#1183405). - net: sched: always do stats accounting according to TCQ_F_CPUSTATS (bsc#1183405). - net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405). - net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405). - net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405). - net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405). - net: sched: prefer qdisc_is_empty() over direct qlen access (bsc#1183405). - net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405). - net: sched: when clearing NOLOCK, clear TCQ_F_CPUSTATS, too (bsc#1183405). - net: tipc: validate domain record count on input (bsc#1195254). - net: usb: lan78xx: add Allied Telesis AT29M2-AF (git-fixes). - net_sched: avoid resetting active qdisc for multiple times (bsc#1183405). - net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405). - net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405). - nfs: do not dirty kernel pages read by direct-io (bsc#1194410). - nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096). - nvme: return BLK_STS_TRANSPORT unless DNR for NVME_SC_NS_NOT_READY (bsc#1163405). - of: Add cpu node iterator for_each_of_cpu_node() (bsc#1065729). - of: Add device_type access helper functions (bsc#1065729). - of: Fix cpu node iterator to not ignore disabled cpu nodes (bsc#1065729). - of: Fix property name in of_node_get_device_type (bsc#1065729). - of: add node name compare helper functions (bsc#1065729). - powerpc/perf: Fix data source encodings for L2.1 and L3.1 accesses (bsc#1065729). - powerpc/prom_init: Fix improper check of prom_getprop() (bsc#1065729). - powerpc/pseries/cpuhp: cache node corrections (bsc#1065729). - powerpc/pseries/cpuhp: delete add/remove_by_count code (bsc#1065729). - powerpc/pseries/mobility: ignore ibm, platform-facilities updates (bsc#1065729). - powerpc/traps: do not enable irqs in _exception (bsc#1065729). - powerpc: add interrupt_cond_local_irq_enable helper (bsc#1065729). - s390/cio: make ccw_device_dma_* more robust (bsc#1193242). - s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193234). - s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194965). - select: Fix indefinitely sleeping task in poll_schedule_timeout() (bsc#1194027). - tpm: Check for integer overflow in tpm2_map_response_body() (bsc#1082555). - tpm: add request_locality before write TPM_INT_ENABLE (bsc#1082555). - tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634). - tracing/kprobes: 'nmissed' not showed correctly for kretprobe (git-fixes). - tracing: Fix check for trace_percpu_buffer validity in get_trace_buf() (git-fixes). - ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes). - usb: core: config: fix validation of wMaxPacketValue entries (git-fixes). - usbnet: fix error return code in usbnet_probe() (git-fixes). - usbnet: sanity check for maxpacket (git-fixes). - vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888). - virtio: write back F_VERSION_1 before validate (bsc#1193235). - x86/platform/uv: Add more to secondary CPU kdump info (bsc#1194493).
Family:unixClass:patch
Status:Reference(s):1065729
1071995
1082555
1163405
1177599
1183405
1184209
1184735
1184739
1186207
1186222
1187428
1187723
1188605
1190973
1192729
1193096
1193234
1193235
1193242
1193507
1193660
1193669
1193727
1193767
1193861
1193864
1193927
1194001
1194027
1194227
1194302
1194410
1194493
1194516
1194529
1194814
1194880
1194888
1194965
1194985
1195065
1195073
1195254
1195272
CVE-2008-5913
CVE-2009-0040
CVE-2009-0652
CVE-2009-0771
CVE-2009-0772
CVE-2009-0773
CVE-2009-0774
CVE-2009-0775
CVE-2009-0776
CVE-2009-0777
CVE-2009-1044
CVE-2009-1169
CVE-2009-1302
CVE-2009-1303
CVE-2009-1304
CVE-2009-1305
CVE-2009-1306
CVE-2009-1307
CVE-2009-1308
CVE-2009-1309
CVE-2009-1310
CVE-2009-1311
CVE-2009-1312
CVE-2009-1313
CVE-2009-1563
CVE-2009-1885
CVE-2009-2470
CVE-2009-2654
CVE-2009-3069
CVE-2009-3070
CVE-2009-3071
CVE-2009-3072
CVE-2009-3073
CVE-2009-3074
CVE-2009-3075
CVE-2009-3077
CVE-2009-3078
CVE-2009-3079
CVE-2009-3274
CVE-2009-3370
CVE-2009-3371
CVE-2009-3372
CVE-2009-3373
CVE-2009-3374
CVE-2009-3375
CVE-2009-3376
CVE-2009-3377
CVE-2009-3378
CVE-2009-3379
CVE-2009-3380
CVE-2009-3381
CVE-2009-3383
CVE-2009-3388
CVE-2009-3389
CVE-2009-3555
CVE-2009-3979
CVE-2009-3980
CVE-2009-3982
CVE-2009-3983
CVE-2009-3984
CVE-2009-3985
CVE-2010-0164
CVE-2010-0165
CVE-2010-0166
CVE-2010-0167
CVE-2010-0168
CVE-2010-0169
CVE-2010-0170
CVE-2010-0171
CVE-2010-0172
CVE-2010-0173
CVE-2010-0174
CVE-2010-0176
CVE-2010-0177
CVE-2010-0178
CVE-2010-0181
CVE-2010-0182
CVE-2010-0654
CVE-2010-1028
CVE-2010-1121
CVE-2010-1125
CVE-2010-1196
CVE-2010-1197
CVE-2010-1198
CVE-2010-1199
CVE-2010-1200
CVE-2010-1201
CVE-2010-1202
CVE-2010-1203
CVE-2010-1205
CVE-2010-1206
CVE-2010-1207
CVE-2010-1208
CVE-2010-1209
CVE-2010-1210
CVE-2010-1211
CVE-2010-1212
CVE-2010-1213
CVE-2010-1214
CVE-2010-1215
CVE-2010-2751
CVE-2010-2752
CVE-2010-2753
CVE-2010-2754
CVE-2010-2755
CVE-2010-2760
CVE-2010-2762
CVE-2010-2764
CVE-2010-2765
CVE-2010-2766
CVE-2010-2767
CVE-2010-2768
CVE-2010-2769
CVE-2010-3166
CVE-2010-3167
CVE-2010-3168
CVE-2010-3169
CVE-2010-3170
CVE-2010-3173
CVE-2010-3174
CVE-2010-3175
CVE-2010-3176
CVE-2010-3177
CVE-2010-3178
CVE-2010-3179
CVE-2010-3180
CVE-2010-3182
CVE-2010-3183
CVE-2010-3765
CVE-2010-4530
CVE-2011-0068
CVE-2011-0069
CVE-2011-0070
CVE-2011-0079
CVE-2011-0080
CVE-2011-0081
CVE-2011-0084
CVE-2011-1187
CVE-2011-1202
CVE-2011-2366
CVE-2011-2367
CVE-2011-2368
CVE-2011-2369
CVE-2011-2370
CVE-2011-2371
CVE-2011-2372
CVE-2011-2373
CVE-2011-2374
CVE-2011-2375
CVE-2011-2377
CVE-2011-2483
CVE-2011-2513
CVE-2011-2514
CVE-2011-2985
CVE-2011-2986
CVE-2011-2988
CVE-2011-2989
CVE-2011-2990
CVE-2011-2991
CVE-2011-2992
CVE-2011-2993
CVE-2011-2995
CVE-2011-2996
CVE-2011-2997
CVE-2011-3000
CVE-2011-3001
CVE-2011-3002
CVE-2011-3003
CVE-2011-3004
CVE-2011-3005
CVE-2011-3026
CVE-2011-3062
CVE-2011-3101
CVE-2011-3232
CVE-2011-3377
CVE-2011-3648
CVE-2011-3650
CVE-2011-3651
CVE-2011-3652
CVE-2011-3654
CVE-2011-3655
CVE-2011-3658
CVE-2011-3659
CVE-2011-3660
CVE-2011-3661
CVE-2011-3663
CVE-2012-0441
CVE-2012-0442
CVE-2012-0443
CVE-2012-0444
CVE-2012-0445
CVE-2012-0446
CVE-2012-0447
CVE-2012-0449
CVE-2012-0451
CVE-2012-0452
CVE-2012-0455
CVE-2012-0456
CVE-2012-0457
CVE-2012-0458
CVE-2012-0459
CVE-2012-0460
CVE-2012-0461
CVE-2012-0462
CVE-2012-0463
CVE-2012-0464
CVE-2012-0467
CVE-2012-0468
CVE-2012-0469
CVE-2012-0470
CVE-2012-0471
CVE-2012-0472
CVE-2012-0473
CVE-2012-0474
CVE-2012-0475
CVE-2012-0477
CVE-2012-0478
CVE-2012-0479
CVE-2012-0759
CVE-2012-1937
CVE-2012-1938
CVE-2012-1940
CVE-2012-1941
CVE-2012-1944
CVE-2012-1945
CVE-2012-1946
CVE-2012-1947
CVE-2012-1948
CVE-2012-1949
CVE-2012-1950
CVE-2012-1951
CVE-2012-1952
CVE-2012-1953
CVE-2012-1954
CVE-2012-1955
CVE-2012-1956
CVE-2012-1957
CVE-2012-1958
CVE-2012-1959
CVE-2012-1960
CVE-2012-1961
CVE-2012-1962
CVE-2012-1963
CVE-2012-1965
CVE-2012-1966
CVE-2012-1967
CVE-2012-1970
CVE-2012-1972
CVE-2012-1973
CVE-2012-1974
CVE-2012-1975
CVE-2012-1976
CVE-2012-3355
CVE-2012-3422
CVE-2012-3423
CVE-2012-3956
CVE-2012-3957
CVE-2012-3958
CVE-2012-3959
CVE-2012-3960
CVE-2012-3961
CVE-2012-3962
CVE-2012-3963
CVE-2012-3964
CVE-2012-3965
CVE-2012-3966
CVE-2012-3967
CVE-2012-3968
CVE-2012-3969
CVE-2012-3970
CVE-2012-3971
CVE-2012-3972
CVE-2012-3973
CVE-2012-3975
CVE-2012-3976
CVE-2012-3978
CVE-2012-3980
CVE-2012-3982
CVE-2012-3983
CVE-2012-3984
CVE-2012-3985
CVE-2012-3986
CVE-2012-3988
CVE-2012-3989
CVE-2012-3990
CVE-2012-3991
CVE-2012-3992
CVE-2012-3993
CVE-2012-3994
CVE-2012-3995
CVE-2012-4179
CVE-2012-4180
CVE-2012-4181
CVE-2012-4182
CVE-2012-4183
CVE-2012-4184
CVE-2012-4185
CVE-2012-4186
CVE-2012-4187
CVE-2012-4188
CVE-2012-4191
CVE-2012-4192
CVE-2012-4193
CVE-2012-4194
CVE-2012-4195
CVE-2012-4196
CVE-2012-4201
CVE-2012-4202
CVE-2012-4203
CVE-2012-4204
CVE-2012-4205
CVE-2012-4207
CVE-2012-4208
CVE-2012-4209
CVE-2012-4210
CVE-2012-4212
CVE-2012-4213
CVE-2012-4214
CVE-2012-4215
CVE-2012-4216
CVE-2012-4217
CVE-2012-4218
CVE-2012-4540
CVE-2012-5829
CVE-2012-5830
CVE-2012-5833
CVE-2012-5835
CVE-2012-5836
CVE-2012-5837
CVE-2012-5838
CVE-2012-5839
CVE-2012-5840
CVE-2012-5841
CVE-2012-5842
CVE-2012-5843
CVE-2013-0221
CVE-2013-0222
CVE-2013-0223
CVE-2013-0743
CVE-2013-0744
CVE-2013-0745
CVE-2013-0746
CVE-2013-0747
CVE-2013-0748
CVE-2013-0749
CVE-2013-0750
CVE-2013-0751
CVE-2013-0752
CVE-2013-0753
CVE-2013-0754
CVE-2013-0755
CVE-2013-0756
CVE-2013-0757
CVE-2013-0758
CVE-2013-0760
CVE-2013-0761
CVE-2013-0762
CVE-2013-0763
CVE-2013-0764
CVE-2013-0765
CVE-2013-0766
CVE-2013-0767
CVE-2013-0768
CVE-2013-0769
CVE-2013-0770
CVE-2013-0771
CVE-2013-0772
CVE-2013-0773
CVE-2013-0774
CVE-2013-0775
CVE-2013-0776
CVE-2013-0777
CVE-2013-0778
CVE-2013-0779
CVE-2013-0780
CVE-2013-0781
CVE-2013-0782
CVE-2013-0783
CVE-2013-0787
CVE-2013-0788
CVE-2013-0789
CVE-2013-0792
CVE-2013-0793
CVE-2013-0794
CVE-2013-0795
CVE-2013-0796
CVE-2013-0800
CVE-2013-0801
CVE-2013-1669
CVE-2013-1670
CVE-2013-1671
CVE-2013-1674
CVE-2013-1675
CVE-2013-1676
CVE-2013-1677
CVE-2013-1678
CVE-2013-1679
CVE-2013-1680
CVE-2013-1681
CVE-2013-1682
CVE-2013-1683
CVE-2013-1684
CVE-2013-1685
CVE-2013-1686
CVE-2013-1687
CVE-2013-1688
CVE-2013-1690
CVE-2013-1692
CVE-2013-1693
CVE-2013-1694
CVE-2013-1695
CVE-2013-1696
CVE-2013-1697
CVE-2013-1698
CVE-2013-1699
CVE-2013-1701
CVE-2013-1702
CVE-2013-1704
CVE-2013-1705
CVE-2013-1708
CVE-2013-1709
CVE-2013-1710
CVE-2013-1711
CVE-2013-1713
CVE-2013-1714
CVE-2013-1717
CVE-2013-1718
CVE-2013-1719
CVE-2013-1720
CVE-2013-1721
CVE-2013-1722
CVE-2013-1723
CVE-2013-1724
CVE-2013-1725
CVE-2013-1728
CVE-2013-1730
CVE-2013-1732
CVE-2013-1735
CVE-2013-1736
CVE-2013-1737
CVE-2013-1738
CVE-2013-1926
CVE-2013-1927
CVE-2013-1981
CVE-2013-1997
CVE-2013-2004
CVE-2013-2063
CVE-2013-2126
CVE-2013-2127
CVE-2013-4349
CVE-2013-5590
CVE-2013-5591
CVE-2013-5592
CVE-2013-5593
CVE-2013-5595
CVE-2013-5596
CVE-2013-5597
CVE-2013-5598
CVE-2013-5599
CVE-2013-5600
CVE-2013-5601
CVE-2013-5602
CVE-2013-5603
CVE-2013-5604
CVE-2013-5609
CVE-2013-5610
CVE-2013-5611
CVE-2013-5612
CVE-2013-5613
CVE-2013-5614
CVE-2013-5615
CVE-2013-5616
CVE-2013-5618
CVE-2013-5619
CVE-2013-6629
CVE-2013-6630
CVE-2013-6671
CVE-2013-6672
CVE-2013-6673
CVE-2014-1477
CVE-2014-1478
CVE-2014-1479
CVE-2014-1480
CVE-2014-1481
CVE-2014-1482
CVE-2014-1483
CVE-2014-1484
CVE-2014-1485
CVE-2014-1486
CVE-2014-1487
CVE-2014-1488
CVE-2014-1489
CVE-2014-1490
CVE-2014-1491
CVE-2014-1544
CVE-2014-1547
CVE-2014-1548
CVE-2014-1553
CVE-2014-1554
CVE-2014-1555
CVE-2014-1556
CVE-2014-1557
CVE-2014-1562
CVE-2014-1563
CVE-2014-1564
CVE-2014-1565
CVE-2014-1567
CVE-2014-1574
CVE-2014-1575
CVE-2014-1576
CVE-2014-1577
CVE-2014-1578
CVE-2014-1581
CVE-2014-1583
CVE-2014-1585
CVE-2014-1586
CVE-2014-1587
CVE-2014-1588
CVE-2014-1590
CVE-2014-1592
CVE-2014-1593
CVE-2014-1594
CVE-2014-3158
CVE-2014-8634
CVE-2014-8635
CVE-2014-8638
CVE-2014-8639
CVE-2014-8641
CVE-2015-0252
CVE-2015-0797
CVE-2015-0801
CVE-2015-0807
CVE-2015-0813
CVE-2015-0814
CVE-2015-0815
CVE-2015-0816
CVE-2015-0817
CVE-2015-0818
CVE-2015-0822
CVE-2015-0827
CVE-2015-0831
CVE-2015-0835
CVE-2015-0836
CVE-2015-2708
CVE-2015-2709
CVE-2015-2710
CVE-2015-2713
CVE-2015-2716
CVE-2015-2721
CVE-2015-2722
CVE-2015-2724
CVE-2015-2725
CVE-2015-2726
CVE-2015-2728
CVE-2015-2730
CVE-2015-2733
CVE-2015-2734
CVE-2015-2735
CVE-2015-2736
CVE-2015-2737
CVE-2015-2738
CVE-2015-2739
CVE-2015-2740
CVE-2015-2743
CVE-2015-3310
CVE-2015-3885
CVE-2015-4000
CVE-2015-4041
CVE-2015-4042
CVE-2015-4473
CVE-2015-4474
CVE-2015-4475
CVE-2015-4478
CVE-2015-4479
CVE-2015-4484
CVE-2015-4485
CVE-2015-4486
CVE-2015-4487
CVE-2015-4488
CVE-2015-4489
CVE-2015-4491
CVE-2015-4492
CVE-2015-4495
CVE-2015-4497
CVE-2015-4498
CVE-2015-4500
CVE-2015-4501
CVE-2015-4506
CVE-2015-4509
CVE-2015-4511
CVE-2015-4513
CVE-2015-4517
CVE-2015-4519
CVE-2015-4520
CVE-2015-4521
CVE-2015-4522
CVE-2015-5185
CVE-2015-5234
CVE-2015-5235
CVE-2015-7174
CVE-2015-7175
CVE-2015-7176
CVE-2015-7177
CVE-2015-7180
CVE-2015-7181
CVE-2015-7182
CVE-2015-7183
CVE-2015-7188
CVE-2015-7189
CVE-2015-7193
CVE-2015-7194
CVE-2015-7196
CVE-2015-7197
CVE-2015-7198
CVE-2015-7199
CVE-2015-7200
CVE-2015-7201
CVE-2015-7202
CVE-2015-7205
CVE-2015-7210
CVE-2015-7212
CVE-2015-7213
CVE-2015-7214
CVE-2015-7222
CVE-2015-8367
CVE-2016-10169
CVE-2016-10170
CVE-2016-10171
CVE-2016-10172
CVE-2016-10196
CVE-2016-1523
CVE-2016-1930
CVE-2016-1931
CVE-2016-1935
CVE-2016-1950
CVE-2016-1952
CVE-2016-1953
CVE-2016-1954
CVE-2016-1957
CVE-2016-1958
CVE-2016-1960
CVE-2016-1961
CVE-2016-1962
CVE-2016-1964
CVE-2016-1965
CVE-2016-1966
CVE-2016-1974
CVE-2016-1977
CVE-2016-2790
CVE-2016-2791
CVE-2016-2792
CVE-2016-2793
CVE-2016-2794
CVE-2016-2795
CVE-2016-2796
CVE-2016-2797
CVE-2016-2798
CVE-2016-2799
CVE-2016-2800
CVE-2016-2801
CVE-2016-2802
CVE-2016-2805
CVE-2016-2807
CVE-2016-2808
CVE-2016-2814
CVE-2016-2815
CVE-2016-2818
CVE-2016-2819
CVE-2016-2821
CVE-2016-2822
CVE-2016-2824
CVE-2016-2828
CVE-2016-2830
CVE-2016-2831
CVE-2016-2835
CVE-2016-2836
CVE-2016-2837
CVE-2016-2838
CVE-2016-2839
CVE-2016-5104
CVE-2016-5250
CVE-2016-5252
CVE-2016-5254
CVE-2016-5257
CVE-2016-5258
CVE-2016-5259
CVE-2016-5261
CVE-2016-5262
CVE-2016-5263
CVE-2016-5264
CVE-2016-5265
CVE-2016-5270
CVE-2016-5272
CVE-2016-5274
CVE-2016-5276
CVE-2016-5277
CVE-2016-5278
CVE-2016-5280
CVE-2016-5281
CVE-2016-5284
CVE-2016-5290
CVE-2016-5291
CVE-2016-5296
CVE-2016-5297
CVE-2016-6354
CVE-2016-7942
CVE-2016-7951
CVE-2016-7952
CVE-2016-9064
CVE-2016-9066
CVE-2016-9079
CVE-2016-9893
CVE-2016-9895
CVE-2016-9897
CVE-2016-9898
CVE-2016-9899
CVE-2016-9900
CVE-2016-9901
CVE-2016-9902
CVE-2016-9904
CVE-2016-9905
CVE-2017-13735
CVE-2017-13738
CVE-2017-13739
CVE-2017-13740
CVE-2017-13741
CVE-2017-13743
CVE-2017-13744
CVE-2017-14608
CVE-2017-16909
CVE-2017-5373
CVE-2017-5375
CVE-2017-5376
CVE-2017-5378
CVE-2017-5380
CVE-2017-5383
CVE-2017-5386
CVE-2017-5390
CVE-2017-5396
CVE-2017-5398
CVE-2017-5400
CVE-2017-5401
CVE-2017-5402
CVE-2017-5404
CVE-2017-5405
CVE-2017-5407
CVE-2017-5408
CVE-2017-5409
CVE-2017-5410
CVE-2017-5429
CVE-2017-5430
CVE-2017-5432
CVE-2017-5433
CVE-2017-5434
CVE-2017-5435
CVE-2017-5436
CVE-2017-5437
CVE-2017-5438
CVE-2017-5439
CVE-2017-5440
CVE-2017-5441
CVE-2017-5442
CVE-2017-5443
CVE-2017-5444
CVE-2017-5445
CVE-2017-5446
CVE-2017-5447
CVE-2017-5448
CVE-2017-5449
CVE-2017-5451
CVE-2017-5454
CVE-2017-5455
CVE-2017-5456
CVE-2017-5459
CVE-2017-5460
CVE-2017-5461
CVE-2017-5462
CVE-2017-5464
CVE-2017-5465
CVE-2017-5466
CVE-2017-5467
CVE-2017-5469
CVE-2017-5470
CVE-2017-5472
CVE-2017-6886
CVE-2017-6887
CVE-2017-6890
CVE-2017-6899
CVE-2017-7749
CVE-2017-7750
CVE-2017-7751
CVE-2017-7752
CVE-2017-7753
CVE-2017-7754
CVE-2017-7755
CVE-2017-7756
CVE-2017-7757
CVE-2017-7758
CVE-2017-7761
CVE-2017-7763
CVE-2017-7764
CVE-2017-7765
CVE-2017-7768
CVE-2017-7778
CVE-2017-7779
CVE-2017-7782
CVE-2017-7784
CVE-2017-7785
CVE-2017-7786
CVE-2017-7787
CVE-2017-7791
CVE-2017-7792
CVE-2017-7793
CVE-2017-7798
CVE-2017-7800
CVE-2017-7801
CVE-2017-7802
CVE-2017-7803
CVE-2017-7804
CVE-2017-7805
CVE-2017-7807
CVE-2017-7810
CVE-2017-7814
CVE-2017-7818
CVE-2017-7819
CVE-2017-7823
CVE-2017-7824
CVE-2017-7825
CVE-2017-7826
CVE-2017-7828
CVE-2017-7830
CVE-2018-11440
CVE-2018-11577
CVE-2018-11683
CVE-2018-11684
CVE-2018-11685
CVE-2018-12085
CVE-2018-12359
CVE-2018-12360
CVE-2018-12362
CVE-2018-12363
CVE-2018-12364
CVE-2018-12365
CVE-2018-12366
CVE-2018-12368
CVE-2018-14598
CVE-2018-14599
CVE-2018-14600
CVE-2018-5089
CVE-2018-5091
CVE-2018-5095
CVE-2018-5096
CVE-2018-5097
CVE-2018-5098
CVE-2018-5099
CVE-2018-5102
CVE-2018-5103
CVE-2018-5104
CVE-2018-5117
CVE-2018-5125
CVE-2018-5127
CVE-2018-5129
CVE-2018-5130
CVE-2018-5131
CVE-2018-5144
CVE-2018-5145
CVE-2018-5146
CVE-2018-5147
CVE-2018-5148
CVE-2018-5150
CVE-2018-5154
CVE-2018-5155
CVE-2018-5156
CVE-2018-5157
CVE-2018-5158
CVE-2018-5159
CVE-2018-5168
CVE-2018-5174
CVE-2018-5178
CVE-2018-5183
CVE-2018-5188
CVE-2018-5800
CVE-2018-5801
CVE-2018-5802
CVE-2018-5810
CVE-2018-5813
CVE-2018-6126
CVE-2020-28097
CVE-2021-3497
CVE-2021-3498
CVE-2021-3564
CVE-2021-39648
CVE-2021-39657
CVE-2021-4083
CVE-2021-4135
CVE-2021-4149
CVE-2021-4197
CVE-2021-4202
CVE-2021-44733
CVE-2022-0322
CVE-2022-0330
CVE-2022-0435
CVE-2022-22942
SUSE-SU-2022:0364-1
Platform(s):openSUSE 13.1
openSUSE 13.1 NonFree
openSUSE 13.2
openSUSE 13.2 NonFree
openSUSE Leap 42.1
SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5
SUSE Linux Enterprise Build System Kit 12
SUSE Linux Enterprise Build System Kit 12 SP1
SUSE Linux Enterprise Build System Kit 12 SP2
SUSE Linux Enterprise Build System Kit 12 SP3
SUSE Linux Enterprise Build System Kit 12 SP4
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Desktop 12 SP4
SUSE Linux Enterprise for SAP 12
SUSE Linux Enterprise for SAP 12 SP1
SUSE Linux Enterprise High Availability 12 SP2
SUSE Linux Enterprise High Availability 12 SP3
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Live Patching 12 SP3
SUSE Linux Enterprise Module for Advanced Systems Management 12
SUSE Linux Enterprise Module for Containers 12
SUSE Linux Enterprise Module for Legacy Software 12
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server 11-SECURITY
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Server for VMWare 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP4
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Software Development Kit 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP3
SUSE Linux Enterprise Workstation Extension 12 SP4
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Build System Kit 12 is installed
  • AND kernel-zfcpdump-3.12.44-52.10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Build System Kit 12 SP1 is installed
  • AND Package Information
  • ocaml-4.02.3-6.6 is installed
  • OR ocaml-ocamldoc-4.02.3-6.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Build System Kit 12 SP2 is installed
  • AND Package Information
  • ghostscript-mini-9.15-17 is installed
  • OR ghostscript-mini-devel-9.15-17 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Build System Kit 12 SP3 is installed
  • AND Package Information
  • libudev-mini-devel-228-150.9 is installed
  • OR libudev-mini1-228-150.9 is installed
  • OR systemd-mini-228-150.9 is installed
  • OR systemd-mini-devel-228-150.9 is installed
  • OR udev-mini-228-150.9 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Build System Kit 12 SP4 is installed
  • AND Package Information
  • libudev-mini-devel-228-150.53 is installed
  • OR libudev-mini1-228-150.53 is installed
  • OR systemd-mini-228-150.53 is installed
  • OR systemd-mini-devel-228-150.53 is installed
  • OR udev-mini-228-150.53 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP2 is installed
  • AND Package Information
  • MozillaFirefox-17.0.9esr-0.3.1 is installed
  • OR MozillaFirefox-translations-17.0.9esr-0.3.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP3 is installed
  • AND Package Information
  • MozillaFirefox-24.5.0esr-0.8.1 is installed
  • OR MozillaFirefox-branding-SLED-24-0.7.36 is installed
  • OR MozillaFirefox-translations-24.5.0esr-0.8.1 is installed
  • OR libfreebl3-3.16-0.8.1 is installed
  • OR libfreebl3-32bit-3.16-0.8.1 is installed
  • OR libsoftokn3-3.16-0.8.1 is installed
  • OR libsoftokn3-32bit-3.16-0.8.1 is installed
  • OR mozilla-nspr-4.10.4-0.3.1 is installed
  • OR mozilla-nspr-32bit-4.10.4-0.3.1 is installed
  • OR mozilla-nss-3.16-0.8.1 is installed
  • OR mozilla-nss-32bit-3.16-0.8.1 is installed
  • OR mozilla-nss-tools-3.16-0.8.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 is installed
  • AND Package Information
  • dbus-1-1.8.12-6 is installed
  • OR dbus-1-x11-1.8.12-6 is installed
  • OR libdbus-1-3-1.8.12-6 is installed
  • OR libdbus-1-3-32bit-1.8.12-6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP1 is installed
  • AND Package Information
  • libxerces-c-3_1-3.1.1-4 is installed
  • OR libxerces-c-3_1-32bit-3.1.1-4 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP3 is installed
  • AND ppp-2.4.7-3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP4 is installed
  • AND Package Information
  • MozillaFirefox-52.9.0esr-109.38 is installed
  • OR MozillaFirefox-translations-52.9.0esr-109.38 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 12 is installed
  • AND Package Information
  • libspice-server1-0.12.4-8.15 is installed
  • OR spice-0.12.4-8.15 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 12 SP1 is installed
  • AND Package Information
  • compat-openssl098-0.9.8j-97.1 is installed
  • OR libopenssl0_9_8-0.9.8j-97.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability 12 SP2 is installed
  • AND haproxy-1.6.5-5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability 12 SP3 is installed
  • AND libpcreposix0-8.39-7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Performance Computing 12 SP5 is installed
  • AND apache2-mod_jk-1.2.40-7.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Live Patching 12 is installed
  • AND Package Information
  • kgraft-patch-3_12_51-60_25-default-5-2 is installed
  • OR kgraft-patch-3_12_51-60_25-xen-5-2 is installed
  • OR kgraft-patch-SLE12-SP1_Update_2-5-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Live Patching 12 SP3 is installed
  • AND Package Information
  • kgraft-patch-4_4_103-6_33-default-1-4.3 is installed
  • OR kgraft-patch-SLE12-SP3_Update_6-1-4.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Advanced Systems Management 12 is installed
  • AND Package Information
  • salt-2016.11.4-46.7 is installed
  • OR salt-api-2016.11.4-46.7 is installed
  • OR salt-bash-completion-2016.11.4-46.7 is installed
  • OR salt-cloud-2016.11.4-46.7 is installed
  • OR salt-doc-2016.11.4-46.7 is installed
  • OR salt-master-2016.11.4-46.7 is installed
  • OR salt-minion-2016.11.4-46.7 is installed
  • OR salt-proxy-2016.11.4-46.7 is installed
  • OR salt-ssh-2016.11.4-46.7 is installed
  • OR salt-syndic-2016.11.4-46.7 is installed
  • OR salt-zsh-completion-2016.11.4-46.7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Containers 12 is installed
  • AND sles12sp1-docker-image-1.0.4-20160308170633 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Legacy Software 12 is installed
  • AND Package Information
  • java-1_6_0-ibm-1.6.0_sr16.1-5 is installed
  • OR java-1_6_0-ibm-fonts-1.6.0_sr16.1-5 is installed
  • OR java-1_6_0-ibm-jdbc-1.6.0_sr16.1-5 is installed
  • OR java-1_6_0-ibm-plugin-1.6.0_sr16.1-5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Public Cloud 12 is installed
  • AND Package Information
  • kernel-ec2-3.12.38-44 is installed
  • OR kernel-ec2-devel-3.12.38-44 is installed
  • OR kernel-ec2-extra-3.12.38-44 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP1 is installed
  • AND Package Information
  • PackageKit-0.3.14-2.12.105 is installed
  • OR PackageKit-lang-0.3.14-2.12.105 is installed
  • OR hal-0.5.12-23.40.5 is installed
  • OR hal-32bit-0.5.12-23.40.5 is installed
  • OR hal-doc-0.5.12-23.40.6 is installed
  • OR hal-x86-0.5.12-23.40.5 is installed
  • OR libpackagekit-glib10-0.3.14-2.12.105 is installed
  • OR yast2-core-2.17.35-0.2.17 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP2 is installed
  • AND NetworkManager-gnome-0.7.1-5.22.28 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 11 SP3 is installed
  • AND
  • libmysql55client18-5.5.45-0.11.1 is installed
  • OR libmysql55client18-32bit-5.5.45-0.11.1 is installed
  • OR libmysql55client18-x86-5.5.45-0.11.1 is installed
  • OR libmysql55client_r18-5.5.45-0.11.1 is installed
  • OR mysql-5.5.45-0.11.1 is installed
  • OR mysql-client-5.5.45-0.11.1 is installed
  • OR mysql-tools-5.5.45-0.11.1 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for VMWare 11 SP3 is installed
  • AND
  • libmysql55client18-5.5.45-0.11.1 is installed
  • OR libmysql55client18-32bit-5.5.45-0.11.1 is installed
  • OR libmysql55client18-x86-5.5.45-0.11.1 is installed
  • OR libmysql55client_r18-5.5.45-0.11.1 is installed
  • OR mysql-5.5.45-0.11.1 is installed
  • OR mysql-client-5.5.45-0.11.1 is installed
  • OR mysql-tools-5.5.45-0.11.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP3 is installed
  • AND hyper-v-5-0.7.10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP3-LTSS is installed
  • AND Package Information
  • curl-7.19.7-1.61.1 is installed
  • OR libcurl4-7.19.7-1.61.1 is installed
  • OR libcurl4-32bit-7.19.7-1.61.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP4 is installed
  • AND Package Information
  • dhcpcd-3.2.3-44.30.1 is installed
  • OR dhcpv6-1.0.22-3.21.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11-SECURITY is installed
  • AND Package Information
  • libldap-openssl1-2_4-2-2.4.26-0.62.3 is installed
  • OR libldap-openssl1-2_4-2-32bit-2.4.26-0.62.3 is installed
  • OR libldap-openssl1-2_4-2-x86-2.4.26-0.62.3 is installed
  • OR openldap2-client-openssl1-2.4.26-0.62.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 is installed
  • AND hardlink-1.0-6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1 is installed
  • AND libXxf86dga1-1.1.4-3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • bash-4.3-78 is installed
  • OR bash-doc-4.3-78 is installed
  • OR libreadline6-6.3-78 is installed
  • OR libreadline6-32bit-6.3-78 is installed
  • OR readline-doc-6.3-78 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • at-3.1.14-7 is installed
  • OR flex-2.5.37-8 is installed
  • OR flex-32bit-2.5.37-8 is installed
  • OR libQtWebKit4-4.8.6+2.3.3-3 is installed
  • OR libQtWebKit4-32bit-4.8.6+2.3.3-3 is installed
  • OR libbonobo-2.32.1-16 is installed
  • OR libbonobo-32bit-2.32.1-16 is installed
  • OR libbonobo-doc-2.32.1-16 is installed
  • OR libbonobo-lang-2.32.1-16 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12 SP5 is installed
  • AND
  • kernel-default-4.12.14-122.110.1 is installed
  • OR kernel-default-base-4.12.14-122.110.1 is installed
  • OR kernel-default-devel-4.12.14-122.110.1 is installed
  • OR kernel-default-man-4.12.14-122.110.1 is installed
  • OR kernel-devel-4.12.14-122.110.1 is installed
  • OR kernel-macros-4.12.14-122.110.1 is installed
  • OR kernel-source-4.12.14-122.110.1 is installed
  • OR kernel-syms-4.12.14-122.110.1 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5 is installed
  • AND
  • kernel-default-4.12.14-122.110.1 is installed
  • OR kernel-default-base-4.12.14-122.110.1 is installed
  • OR kernel-default-devel-4.12.14-122.110.1 is installed
  • OR kernel-default-man-4.12.14-122.110.1 is installed
  • OR kernel-devel-4.12.14-122.110.1 is installed
  • OR kernel-macros-4.12.14-122.110.1 is installed
  • OR kernel-source-4.12.14-122.110.1 is installed
  • OR kernel-syms-4.12.14-122.110.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
  • AND Package Information
  • libpython3_4m1_0-3.4.1-12 is installed
  • OR python3-base-3.4.1-12 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2 is installed
  • AND Package Information
  • kgraft-patch-4_4_121-92_109-default-2-2 is installed
  • OR kgraft-patch-SLE12-SP2_Update_29-2-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
  • AND Package Information
  • GraphicsMagick-1.2.5-4.33.1 is installed
  • OR libGraphicsMagick2-1.2.5-4.33.1 is installed
  • OR perl-GraphicsMagick-1.2.5-4.33.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
  • AND Package Information
  • MozillaFirefox-31.8.0esr-0.10.1 is installed
  • OR MozillaFirefox-devel-31.8.0esr-0.10.1 is installed
  • OR mozilla-nspr-4.10.8-0.5.1 is installed
  • OR mozilla-nspr-devel-4.10.8-0.5.1 is installed
  • OR mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed
  • OR mozilla-nss-devel-3.19.2_CKBI_1.98-0.10.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
  • AND Package Information
  • kdelibs3-32bit-3.5.10-23.27.1 is installed
  • OR kdelibs3-arts-3.5.10-23.27.1 is installed
  • OR kdelibs3-arts-32bit-3.5.10-23.27.1 is installed
  • OR kdelibs3-arts-x86-3.5.10-23.27.1 is installed
  • OR kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed
  • OR kdelibs3-devel-3.5.10-23.27.1 is installed
  • OR kdelibs3-doc-3.5.10-23.27.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 is installed
  • AND MozillaFirefox-devel-31.1.0esr-1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
  • AND automake-1.13.4-4 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
  • AND LibVNCServer-devel-0.9.9-16 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
  • AND audiofile-devel-0.3.6-10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP4 is installed
  • AND Package Information
  • libsilc-1_1-2-1.1.10-24 is installed
  • OR libsilcclient-1_1-3-1.1.10-24 is installed
  • OR silc-toolkit-1.1.10-24 is installed
  • BACK