Revision Date: | 2021-05-12 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509). - CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208). - CVE-2021-29155: Fixed an issue within kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations (bnc#1184942). - CVE-2020-36310: Fixed an issue in arch/x86/kvm/svm/svm.c that allowed a set_memory_region_test infinite loop for certain nested page faults (bnc#1184512). - CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583). - CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391). - CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181). - CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181). - CVE-2020-36311: Fixed an issue in arch/x86/kvm/svm/sev.c that allowed attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions) (bnc#1184511). - CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211). - CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211). - CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120). - CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393). - CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397). - CVE-2021-28964: Fixed a race condition in fs/btrfs/ctree.c that could have caused a denial of service because of a lack of locking on an extent buffer before a cloning operation (bnc#1184193). - CVE-2021-3444: Fixed the bpf verifier as it did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution (bnc#1184170). - CVE-2021-28971: Fixed a potential local denial of service in intel_pmu_drain_pebs_nhm where userspace applications can cause a system crash because the PEBS status in a PEBS record is mishandled (bnc#1184196). - CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646). - CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167). - CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168). - CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198). - CVE-2021-29647: Fixed an issue in kernel qrtr_recvmsg in net/qrtr/qrtr.c that allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bnc#1184192). - CVE-2020-27171: Fixed an issue in kernel/bpf/verifier.c that had an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bnc#1183686, bnc#1183775). - CVE-2020-27170: Fixed an issue in kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. This affects pointer types that do not define a ptr_limit (bnc#1183686 bnc#1183775). - CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593). - CVE-2020-35519: Update patch reference for x25 fix (bsc#1183696). - CVE-2021-3428: Fixed ext4 integer overflow in ext4_es_cache_extent (bsc#1173485, bsc#1183509). - CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720). - CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069). - CVE-2020-27815: Fixed jfs array index bounds check in dbAdjTree (bsc#1179454). - CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715). - CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716). - CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
The following non-security bugs were fixed:
- Revert 'rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)' This turned out to be a bad idea: the kernel-$flavor-devel package must be usable without kernel-$flavor, e.g. at the build of a KMP. And this change brought superfluous installation of kernel-preempt when a system had kernel-syms (bsc#1185113). - Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). - bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). - bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775). - ext4: check journal inode extents more carefully (bsc#1173485). - ext4: do not allow overlapping system zones (bsc#1173485). - ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485). - hv: clear ring_buffer pointer during cleanup (part of ae6935ed) (bsc#1181032). - hv_netvsc: remove ndo_poll_controller (bsc#1185248). - macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). - post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388). - rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514). - rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063). - rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439) - rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244) - rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650) - xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1047233 1173485 1176720 1177411 1178181 1179454 1181032 1182672 1182715 1182716 1182717 1183022 1183063 1183069 1183509 1183593 1183646 1183686 1183696 1183775 1184120 1184167 1184168 1184170 1184192 1184193 1184194 1184196 1184198 1184208 1184211 1184388 1184391 1184393 1184397 1184509 1184511 1184512 1184514 1184583 1184650 1184942 1185113 1185244 1185248 CVE-2006-7250 CVE-2008-5077 CVE-2009-0037 CVE-2009-0590 CVE-2009-0591 CVE-2009-0696 CVE-2009-0789 CVE-2009-0946 CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 CVE-2009-1386 CVE-2009-1387 CVE-2009-2417 CVE-2009-4022 CVE-2010-0624 CVE-2010-0740 CVE-2010-0742 CVE-2010-1633 CVE-2010-2497 CVE-2010-2547 CVE-2010-2805 CVE-2010-2939 CVE-2010-3053 CVE-2010-3054 CVE-2010-3311 CVE-2010-3430 CVE-2010-3431 CVE-2010-3613 CVE-2010-3614 CVE-2010-3615 CVE-2010-3814 CVE-2010-3853 CVE-2010-3855 CVE-2010-3864 CVE-2010-5298 CVE-2011-0014 CVE-2011-0226 CVE-2011-0414 CVE-2011-1907 CVE-2011-1910 CVE-2011-2464 CVE-2011-3148 CVE-2011-3149 CVE-2011-3207 CVE-2011-3210 CVE-2011-3256 CVE-2011-3439 CVE-2011-4108 CVE-2011-4313 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0027 CVE-2012-0050 CVE-2012-0884 CVE-2012-1126 CVE-2012-1127 CVE-2012-1128 CVE-2012-1129 CVE-2012-1130 CVE-2012-1131 CVE-2012-1132 CVE-2012-1133 CVE-2012-1134 CVE-2012-1135 CVE-2012-1136 CVE-2012-1137 CVE-2012-1138 CVE-2012-1139 CVE-2012-1140 CVE-2012-1141 CVE-2012-1142 CVE-2012-1143 CVE-2012-1144 CVE-2012-1165 CVE-2012-1667 CVE-2012-2110 CVE-2012-2686 CVE-2012-3817 CVE-2012-3868 CVE-2012-4244 CVE-2012-4929 CVE-2012-5166 CVE-2012-5668 CVE-2012-5669 CVE-2012-5670 CVE-2012-5688 CVE-2012-5689 CVE-2013-0166 CVE-2013-0169 CVE-2013-0249 CVE-2013-1944 CVE-2013-1987 CVE-2013-2142 CVE-2013-2174 CVE-2013-2266 CVE-2013-4238 CVE-2013-4314 CVE-2013-4351 CVE-2013-4353 CVE-2013-4402 CVE-2013-4545 CVE-2013-4854 CVE-2013-6449 CVE-2013-6450 CVE-2014-0015 CVE-2014-0076 CVE-2014-0138 CVE-2014-0139 CVE-2014-0160 CVE-2014-0195 CVE-2014-0198 CVE-2014-0221 CVE-2014-0224 CVE-2014-0591 CVE-2014-2240 CVE-2014-2241 CVE-2014-2583 CVE-2014-3065 CVE-2014-3430 CVE-2014-3470 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 CVE-2014-3569 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-3613 CVE-2014-3620 CVE-2014-3707 CVE-2014-4288 CVE-2014-4607 CVE-2014-4617 CVE-2014-5139 CVE-2014-6456 CVE-2014-6457 CVE-2014-6458 CVE-2014-6466 CVE-2014-6476 CVE-2014-6492 CVE-2014-6493 CVE-2014-6502 CVE-2014-6503 CVE-2014-6506 CVE-2014-6511 CVE-2014-6512 CVE-2014-6513 CVE-2014-6515 CVE-2014-6527 CVE-2014-6531 CVE-2014-6532 CVE-2014-6558 CVE-2014-8150 CVE-2014-8275 CVE-2014-8500 CVE-2014-8891 CVE-2014-8892 CVE-2014-9112 CVE-2014-9656 CVE-2014-9657 CVE-2014-9658 CVE-2014-9659 CVE-2014-9660 CVE-2014-9661 CVE-2014-9662 CVE-2014-9663 CVE-2014-9664 CVE-2014-9665 CVE-2014-9666 CVE-2014-9667 CVE-2014-9668 CVE-2014-9669 CVE-2014-9670 CVE-2014-9671 CVE-2014-9672 CVE-2014-9673 CVE-2014-9674 CVE-2014-9675 CVE-2015-0138 CVE-2015-0192 CVE-2015-0204 CVE-2015-0204 CVE-2015-0205 CVE-2015-0206 CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0293 CVE-2015-0458 CVE-2015-0459 CVE-2015-0469 CVE-2015-0477 CVE-2015-0478 CVE-2015-0480 CVE-2015-0488 CVE-2015-0491 CVE-2015-1349 CVE-2015-1606 CVE-2015-1607 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-1793 CVE-2015-1794 CVE-2015-1914 CVE-2015-1931 CVE-2015-2590 CVE-2015-2601 CVE-2015-2613 CVE-2015-2619 CVE-2015-2621 CVE-2015-2625 CVE-2015-2632 CVE-2015-2637 CVE-2015-2638 CVE-2015-2664 CVE-2015-2808 CVE-2015-3143 CVE-2015-3144 CVE-2015-3145 CVE-2015-3148 CVE-2015-3153 CVE-2015-3193 CVE-2015-3194 CVE-2015-3195 CVE-2015-3196 CVE-2015-3197 CVE-2015-3236 CVE-2015-3237 CVE-2015-3238 CVE-2015-4000 CVE-2015-4620 CVE-2015-4729 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4734 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810 CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844 CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883 CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006 CVE-2015-5041 CVE-2015-5477 CVE-2015-5722 CVE-2015-7575 CVE-2015-7981 CVE-2015-8000 CVE-2015-8126 CVE-2015-8472 CVE-2015-8540 CVE-2015-8704 CVE-2016-0264 CVE-2016-0363 CVE-2016-0376 CVE-2016-0402 CVE-2016-0448 CVE-2016-0466 CVE-2016-0483 CVE-2016-0494 CVE-2016-0686 CVE-2016-0687 CVE-2016-0701 CVE-2016-0702 CVE-2016-0705 CVE-2016-0755 CVE-2016-0772 CVE-2016-0797 CVE-2016-0798 CVE-2016-0800 CVE-2016-1000110 CVE-2016-10165 CVE-2016-1285 CVE-2016-1286 CVE-2016-2037 CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2109 CVE-2016-2176 CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-2183 CVE-2016-2775 CVE-2016-2776 CVE-2016-3422 CVE-2016-3426 CVE-2016-3427 CVE-2016-3443 CVE-2016-3449 CVE-2016-3485 CVE-2016-3511 CVE-2016-3598 CVE-2016-4983 CVE-2016-5104 CVE-2016-5419 CVE-2016-5420 CVE-2016-5421 CVE-2016-5542 CVE-2016-5554 CVE-2016-5556 CVE-2016-5568 CVE-2016-5573 CVE-2016-5597 CVE-2016-5636 CVE-2016-5699 CVE-2016-6170 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306 CVE-2016-7052 CVE-2016-7055 CVE-2016-7056 CVE-2016-7141 CVE-2016-7167 CVE-2016-7949 CVE-2016-7950 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 CVE-2016-8625 CVE-2016-8864 CVE-2016-9131 CVE-2016-9147 CVE-2016-9444 CVE-2016-9586 CVE-2016-9594 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843 CVE-2017-1000099 CVE-2017-1000100 CVE-2017-1000101 CVE-2017-1000158 CVE-2017-1000254 CVE-2017-1000257 CVE-2017-10053 CVE-2017-10067 CVE-2017-10074 CVE-2017-10081 CVE-2017-10087 CVE-2017-10089 CVE-2017-10090 CVE-2017-10096 CVE-2017-10101 CVE-2017-10102 CVE-2017-10105 CVE-2017-10107 CVE-2017-10108 CVE-2017-10109 CVE-2017-10110 CVE-2017-10111 CVE-2017-10115 CVE-2017-10116 CVE-2017-10125 CVE-2017-10243 CVE-2017-10281 CVE-2017-10285 CVE-2017-10293 CVE-2017-10295 CVE-2017-10345 CVE-2017-10346 CVE-2017-10347 CVE-2017-10348 CVE-2017-10349 CVE-2017-10350 CVE-2017-10355 CVE-2017-10356 CVE-2017-10357 CVE-2017-10388 CVE-2017-1289 CVE-2017-14461 CVE-2017-15130 CVE-2017-15132 CVE-2017-18207 CVE-2017-2629 CVE-2017-2669 CVE-2017-3135 CVE-2017-3136 CVE-2017-3137 CVE-2017-3138 CVE-2017-3142 CVE-2017-3143 CVE-2017-3145 CVE-2017-3509 CVE-2017-3511 CVE-2017-3512 CVE-2017-3514 CVE-2017-3533 CVE-2017-3539 CVE-2017-3544 CVE-2017-3731 CVE-2017-3732 CVE-2017-7407 CVE-2017-7468 CVE-2017-8779 CVE-2017-8816 CVE-2017-8817 CVE-2017-8818 CVE-2017-9502 CVE-2018-0500 CVE-2018-1000005 CVE-2018-1000007 CVE-2018-1000030 CVE-2018-1000120 CVE-2018-1000121 CVE-2018-1000122 CVE-2018-1000300 CVE-2018-1000301 CVE-2018-1000802 CVE-2018-1000807 CVE-2018-1000808 CVE-2018-11212 CVE-2018-12020 CVE-2018-12539 CVE-2018-12547 CVE-2018-13785 CVE-2018-1417 CVE-2018-14618 CVE-2018-1517 CVE-2018-1656 CVE-2018-16839 CVE-2018-16840 CVE-2018-16842 CVE-2018-16890 CVE-2018-2579 CVE-2018-2582 CVE-2018-2588 CVE-2018-2599 CVE-2018-2602 CVE-2018-2603 CVE-2018-2618 CVE-2018-2633 CVE-2018-2634 CVE-2018-2637 CVE-2018-2641 CVE-2018-2657 CVE-2018-2663 CVE-2018-2677 CVE-2018-2678 CVE-2018-2783 CVE-2018-2790 CVE-2018-2794 CVE-2018-2795 CVE-2018-2796 CVE-2018-2797 CVE-2018-2798 CVE-2018-2799 CVE-2018-2800 CVE-2018-2814 CVE-2018-2940 CVE-2018-2952 CVE-2018-2973 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3214 CVE-2018-5740 CVE-2018-5743 CVE-2018-5745 CVE-2019-10245 CVE-2019-11500 CVE-2019-11771 CVE-2019-11775 CVE-2019-13050 CVE-2019-2422 CVE-2019-2426 CVE-2019-2602 CVE-2019-2684 CVE-2019-2697 CVE-2019-2698 CVE-2019-2762 CVE-2019-2766 CVE-2019-2769 CVE-2019-2816 CVE-2019-3814 CVE-2019-3822 CVE-2019-3823 CVE-2019-4473 CVE-2019-5436 CVE-2019-5481 CVE-2019-5482 CVE-2019-6465 CVE-2019-6471 CVE-2019-7317 CVE-2019-7524 CVE-2020-0433 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 CVE-2020-27170 CVE-2020-27171 CVE-2020-27673 CVE-2020-27815 CVE-2020-35519 CVE-2020-36310 CVE-2020-36311 CVE-2020-36312 CVE-2020-36322 CVE-2021-20219 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038 CVE-2021-28660 CVE-2021-28688 CVE-2021-28950 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29154 CVE-2021-29155 CVE-2021-29264 CVE-2021-29265 CVE-2021-29647 CVE-2021-29650 CVE-2021-30002 CVE-2021-3428 CVE-2021-3444 CVE-2021-3483 SUSE-SU-2021:1573-1
|
Platform(s): | openSUSE 13.1 openSUSE 13.1 NonFree openSUSE 13.2 openSUSE 13.2 NonFree openSUSE Leap 42.1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Desktop 12 SUSE Linux Enterprise Desktop 12 SP1 SUSE Linux Enterprise Desktop 12 SP2 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise for SAP 11 SP2 SUSE Linux Enterprise for SAP 11 SP4 SUSE Linux Enterprise for SAP 12 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP4 SUSE Linux Enterprise High Performance Computing 12 SP5 SUSE Linux Enterprise High Performance Computing 15 SUSE Linux Enterprise Module for Live Patching 15 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Module for Toolchain 12 SUSE Linux Enterprise Module for Web Scripting 12 SUSE Linux Enterprise Point of Sale 11 SP3 SUSE Linux Enterprise Point of Sale 12 SP2 SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT SUSE Linux Enterprise Real Time Extension 11 SP4 SUSE Linux Enterprise Real Time Extension 12 SP1 SUSE Linux Enterprise Real Time Extension 12 SP2 SUSE Linux Enterprise Real Time Extension 12 SP3 SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP3-LTSS SUSE Linux Enterprise Server 11 SP4 SUSE Linux Enterprise Server 11-SECURITY SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Server 15 SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP4 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Software Development Kit 12 SP1 SUSE Linux Enterprise Software Development Kit 12 SP2 SUSE Linux Enterprise Software Development Kit 12 SP3 SUSE Linux Enterprise Software Development Kit 12 SP4 SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Workstation Extension 12 SP1 SUSE Linux Enterprise Workstation Extension 12 SP2 SUSE Linux Enterprise Workstation Extension 12 SP3 SUSE OpenStack Cloud 5
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP2 is installed AND Package Information
MozillaFirefox-17.0.9esr-0.3.1 is installed
OR MozillaFirefox-translations-17.0.9esr-0.3.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP4 is installed
AND Package Information
gpg2-2.0.9-25.33.41.2 is installed
OR gpg2-lang-2.0.9-25.33.41.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed
AND Package Information
openssh-6.6p1-33 is installed
OR openssh-askpass-gnome-6.6p1-33 is installed
OR openssh-helpers-6.6p1-33 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP1 is installed
AND Package Information
compat-openssl098-0.9.8j-87 is installed
OR libopenssl0_9_8-0.9.8j-87 is installed
OR libopenssl0_9_8-32bit-0.9.8j-87 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed
AND Package Information
bind-9.9.9P1-49 is installed
OR bind-libs-9.9.9P1-49 is installed
OR bind-libs-32bit-9.9.9P1-49 is installed
OR bind-utils-9.9.9P1-49 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND Package Information
libXrender1-0.9.8-7 is installed
OR libXrender1-32bit-0.9.8-7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise for SAP 11 SP2 is installed
AND Package Information
compat-openssl097g-0.9.7g-146.22.1 is installed
OR compat-openssl097g-32bit-0.9.7g-146.22.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise for SAP 11 SP4 is installed
AND Package Information
compat-openssl097g-0.9.7g-146.22.36.1 is installed
OR compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise for SAP 12 is installed
AND Package Information
kgraft-patch-3_12_60-52_54-default-2-2 is installed
OR kgraft-patch-3_12_60-52_54-xen-2-2 is installed
OR kgraft-patch-SLE12_Update_15-2-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability Extension 11 SP3 is installed
AND ctdb-1.0.114.6-0.11.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability Extension 11 SP4 is installed
AND Package Information
hawk-0.7.0+git.1430140184.8e872c5-7.1 is installed
OR hawk-templates-0.7.0+git.1430140184.8e872c5-7.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Performance Computing 12 SP5 is installed
AND Package Information
bind-9.11.2-3.10 is installed
OR bind-chrootenv-9.11.2-3.10 is installed
OR bind-doc-9.11.2-3.10 is installed
OR bind-utils-9.11.2-3.10 is installed
OR libbind9-160-9.11.2-3.10 is installed
OR libdns169-9.11.2-3.10 is installed
OR libirs160-9.11.2-3.10 is installed
OR libisc166-9.11.2-3.10 is installed
OR libisc166-32bit-9.11.2-3.10 is installed
OR libisccc160-9.11.2-3.10 is installed
OR libisccfg160-9.11.2-3.10 is installed
OR liblwres160-9.11.2-3.10 is installed
OR python-bind-9.11.2-3.10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 is installed
AND Package Information
kernel-default-livepatch-4.12.14-150.72.1 is installed
OR kernel-livepatch-4_12_14-150_72-default-1-1.3.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Public Cloud 12 is installed
AND Package Information
kernel-ec2-3.12.74-60.64.82 is installed
OR kernel-ec2-devel-3.12.74-60.64.82 is installed
OR kernel-ec2-extra-3.12.74-60.64.82 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Toolchain 12 is installed
AND Package Information
cpp5-5.3.1+r233831-9 is installed
OR gcc5-5.3.1+r233831-9 is installed
OR gcc5-32bit-5.3.1+r233831-9 is installed
OR gcc5-ada-5.3.1+r233831-9 is installed
OR gcc5-ada-32bit-5.3.1+r233831-9 is installed
OR gcc5-c++-5.3.1+r233831-9 is installed
OR gcc5-c++-32bit-5.3.1+r233831-9 is installed
OR gcc5-fortran-5.3.1+r233831-9 is installed
OR gcc5-fortran-32bit-5.3.1+r233831-9 is installed
OR gcc5-info-5.3.1+r233831-9 is installed
OR gcc5-locale-5.3.1+r233831-9 is installed
OR libada5-5.3.1+r233831-9 is installed
OR libada5-32bit-5.3.1+r233831-9 is installed
OR libffi-devel-gcc5-5.3.1+r233831-9 is installed
OR libffi-devel-gcc5-32bit-5.3.1+r233831-9 is installed
OR libffi-gcc5-5.3.1+r233831-9 is installed
OR libstdc++6-devel-gcc5-5.3.1+r233831-9 is installed
OR libstdc++6-devel-gcc5-32bit-5.3.1+r233831-9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Web Scripting 12 is installed
AND Package Information
apache2-mod_php5-5.5.14-30 is installed
OR php5-5.5.14-30 is installed
OR php5-bcmath-5.5.14-30 is installed
OR php5-bz2-5.5.14-30 is installed
OR php5-calendar-5.5.14-30 is installed
OR php5-ctype-5.5.14-30 is installed
OR php5-curl-5.5.14-30 is installed
OR php5-dba-5.5.14-30 is installed
OR php5-dom-5.5.14-30 is installed
OR php5-enchant-5.5.14-30 is installed
OR php5-exif-5.5.14-30 is installed
OR php5-fastcgi-5.5.14-30 is installed
OR php5-fileinfo-5.5.14-30 is installed
OR php5-fpm-5.5.14-30 is installed
OR php5-ftp-5.5.14-30 is installed
OR php5-gd-5.5.14-30 is installed
OR php5-gettext-5.5.14-30 is installed
OR php5-gmp-5.5.14-30 is installed
OR php5-iconv-5.5.14-30 is installed
OR php5-intl-5.5.14-30 is installed
OR php5-json-5.5.14-30 is installed
OR php5-ldap-5.5.14-30 is installed
OR php5-mbstring-5.5.14-30 is installed
OR php5-mcrypt-5.5.14-30 is installed
OR php5-mysql-5.5.14-30 is installed
OR php5-odbc-5.5.14-30 is installed
OR php5-openssl-5.5.14-30 is installed
OR php5-pcntl-5.5.14-30 is installed
OR php5-pdo-5.5.14-30 is installed
OR php5-pear-5.5.14-30 is installed
OR php5-pgsql-5.5.14-30 is installed
OR php5-pspell-5.5.14-30 is installed
OR php5-shmop-5.5.14-30 is installed
OR php5-snmp-5.5.14-30 is installed
OR php5-soap-5.5.14-30 is installed
OR php5-sockets-5.5.14-30 is installed
OR php5-sqlite-5.5.14-30 is installed
OR php5-suhosin-5.5.14-30 is installed
OR php5-sysvmsg-5.5.14-30 is installed
OR php5-sysvsem-5.5.14-30 is installed
OR php5-sysvshm-5.5.14-30 is installed
OR php5-tokenizer-5.5.14-30 is installed
OR php5-wddx-5.5.14-30 is installed
OR php5-xmlreader-5.5.14-30 is installed
OR php5-xmlrpc-5.5.14-30 is installed
OR php5-xmlwriter-5.5.14-30 is installed
OR php5-xsl-5.5.14-30 is installed
OR php5-zip-5.5.14-30 is installed
OR php5-zlib-5.5.14-30 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Point of Sale 11 SP3 is installed
AND Package Information
bind-9.9.6P1-0.33.1 is installed
OR bind-chrootenv-9.9.6P1-0.33.1 is installed
OR bind-doc-9.9.6P1-0.33.1 is installed
OR bind-libs-9.9.6P1-0.33.1 is installed
OR bind-utils-9.9.6P1-0.33.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Point of Sale 12 SP2 is installed
AND Package Information
salt-2016.11.4-46.7 is installed
OR salt-minion-2016.11.4-46.7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT is installed
AND Package Information
kernel-firmware-20170530-21.22 is installed
OR ucode-amd-20170530-21.22 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Real Time Extension 11 SP4 is installed
AND Package Information
kernel-rt-3.0.101.rt130-54.1 is installed
OR kernel-rt-base-3.0.101.rt130-54.1 is installed
OR kernel-rt-devel-3.0.101.rt130-54.1 is installed
OR kernel-rt_trace-3.0.101.rt130-54.1 is installed
OR kernel-rt_trace-base-3.0.101.rt130-54.1 is installed
OR kernel-rt_trace-devel-3.0.101.rt130-54.1 is installed
OR kernel-source-rt-3.0.101.rt130-54.1 is installed
OR kernel-syms-rt-3.0.101.rt130-54.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Real Time Extension 12 SP1 is installed
AND Package Information
kernel-compute-3.12.69-60.30 is installed
OR kernel-compute-base-3.12.69-60.30 is installed
OR kernel-compute-devel-3.12.69-60.30 is installed
OR kernel-compute_debug-3.12.69-60.30 is installed
OR kernel-compute_debug-devel-3.12.69-60.30 is installed
OR kernel-devel-rt-3.12.69-60.30 is installed
OR kernel-rt-3.12.69-60.30 is installed
OR kernel-rt-base-3.12.69-60.30 is installed
OR kernel-rt-devel-3.12.69-60.30 is installed
OR kernel-rt_debug-3.12.69-60.30 is installed
OR kernel-rt_debug-devel-3.12.69-60.30 is installed
OR kernel-source-rt-3.12.69-60.30 is installed
OR kernel-syms-rt-3.12.69-60.30 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Real Time Extension 12 SP2 is installed
AND Package Information
cluster-md-kmp-rt-4.4.114-27 is installed
OR cluster-network-kmp-rt-4.4.114-27 is installed
OR dlm-kmp-rt-4.4.114-27 is installed
OR gfs2-kmp-rt-4.4.114-27 is installed
OR kernel-devel-rt-4.4.114-27 is installed
OR kernel-rt-4.4.114-27 is installed
OR kernel-rt-base-4.4.114-27 is installed
OR kernel-rt-devel-4.4.114-27 is installed
OR kernel-rt_debug-4.4.114-27 is installed
OR kernel-rt_debug-devel-4.4.114-27 is installed
OR kernel-source-rt-4.4.114-27 is installed
OR kernel-syms-rt-4.4.114-27 is installed
OR ocfs2-kmp-rt-4.4.114-27 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Real Time Extension 12 SP3 is installed
AND Package Information
cluster-md-kmp-rt-4.4.128-3.11 is installed
OR dlm-kmp-rt-4.4.128-3.11 is installed
OR gfs2-kmp-rt-4.4.128-3.11 is installed
OR kernel-devel-rt-4.4.128-3.11 is installed
OR kernel-rt-4.4.128-3.11 is installed
OR kernel-rt-base-4.4.128-3.11 is installed
OR kernel-rt-devel-4.4.128-3.11 is installed
OR kernel-rt_debug-4.4.128-3.11 is installed
OR kernel-rt_debug-devel-4.4.128-3.11 is installed
OR kernel-source-rt-4.4.128-3.11 is installed
OR kernel-syms-rt-4.4.128-3.11 is installed
OR ocfs2-kmp-rt-4.4.128-3.11 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 is installed
AND Package Information
libMagickCore1-6.4.3.6-7.19.1 is installed
OR libMagickCore1-32bit-6.4.3.6-7.19.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP1 is installed
AND Package Information
libsnmp15-5.4.2.1-8.2.1 is installed
OR libsnmp15-32bit-5.4.2.1-8.2.1 is installed
OR libsnmp15-x86-5.4.2.1-8.2.1 is installed
OR net-snmp-5.4.2.1-8.2.1 is installed
OR perl-SNMP-5.4.2.1-8.2.1 is installed
OR snmp-mibs-5.4.2.1-8.2.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed
AND Package Information
rhn-virtualization-common-5.4.15-0.15.2 is installed
OR rhn-virtualization-host-5.4.15-0.15.2 is installed
OR rhncfg-5.9.33-0.20.1 is installed
OR rhncfg-actions-5.9.33-0.20.1 is installed
OR rhncfg-client-5.9.33-0.20.1 is installed
OR rhncfg-management-5.9.33-0.20.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP2 is installed
AND Package Information
MozillaFirefox-10.0-0.3.2 is installed
OR MozillaFirefox-translations-10.0-0.3.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3 is installed
AND squid-2.7.STABLE5-2.12.12.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP4 is installed
AND apache2-mod_jk-1.2.40-0.2.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11-SECURITY is installed
AND Package Information
libopenssl1-devel-1.0.1g-0.35.1 is installed
OR libopenssl1_0_0-1.0.1g-0.35.1 is installed
OR libopenssl1_0_0-32bit-1.0.1g-0.35.1 is installed
OR libopenssl1_0_0-x86-1.0.1g-0.35.1 is installed
OR openssl1-1.0.1g-0.35.1 is installed
OR openssl1-doc-1.0.1g-0.35.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 is installed
AND Package Information
bind-9.9.5P1-1 is installed
OR bind-chrootenv-9.9.5P1-1 is installed
OR bind-doc-9.9.5P1-1 is installed
OR bind-libs-9.9.5P1-1 is installed
OR bind-libs-32bit-9.9.5P1-1 is installed
OR bind-utils-9.9.5P1-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND apache2-mod_nss-1.0.8-13 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
glib2-lang-2.48.2-10 is installed
OR glib2-tools-2.48.2-10 is installed
OR libgio-2_0-0-2.48.2-10 is installed
OR libgio-2_0-0-32bit-2.48.2-10 is installed
OR libglib-2_0-0-2.48.2-10 is installed
OR libglib-2_0-0-32bit-2.48.2-10 is installed
OR libgmodule-2_0-0-2.48.2-10 is installed
OR libgmodule-2_0-0-32bit-2.48.2-10 is installed
OR libgobject-2_0-0-2.48.2-10 is installed
OR libgobject-2_0-0-32bit-2.48.2-10 is installed
OR libgthread-2_0-0-2.48.2-10 is installed
OR libgthread-2_0-0-32bit-2.48.2-10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
coreutils-8.25-12 is installed
OR coreutils-lang-8.25-12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
augeas-1.2.0-17.3 is installed
OR augeas-lenses-1.2.0-17.3 is installed
OR libaugeas0-1.2.0-17.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP5 is installed
AND Package Information
apache2-2.4.23-29.43 is installed
OR apache2-doc-2.4.23-29.43 is installed
OR apache2-example-pages-2.4.23-29.43 is installed
OR apache2-prefork-2.4.23-29.43 is installed
OR apache2-utils-2.4.23-29.43 is installed
OR apache2-worker-2.4.23-29.43 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12-LTSS is installed
AND Package Information
kgraft-patch-3_12_44-52_18-default-6-2.2 is installed
OR kgraft-patch-3_12_44-52_18-xen-6-2.2 is installed
OR kgraft-patch-SLE12_Update_7-6-2.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
AND Package Information
ghostscript-9.15-17 is installed
OR ghostscript-x11-9.15-17 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
AND Package Information
liblcms-devel-1.17-77.16.1 is installed
OR liblcms-devel-32bit-1.17-77.16.1 is installed
OR python-lcms-1.17-77.16.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
AND Package Information
ImageMagick-6.4.3.6-7.30.1 is installed
OR ImageMagick-devel-6.4.3.6-7.30.1 is installed
OR libMagick++-devel-6.4.3.6-7.30.1 is installed
OR libMagick++1-6.4.3.6-7.30.1 is installed
OR libMagickWand1-6.4.3.6-7.30.1 is installed
OR libMagickWand1-32bit-6.4.3.6-7.30.1 is installed
OR perl-PerlMagick-6.4.3.6-7.30.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
AND Package Information
libdrm-devel-2.4.52-0.7.1 is installed
OR libdrm-devel-32bit-2.4.52-0.7.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 is installed
AND mercurial-2.8.2-9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
AND Package Information
MozillaFirefox-38.5.0esr-54 is installed
OR MozillaFirefox-devel-38.5.0esr-54 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
AND dovecot22-devel-2.2.13-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
AND apache2-devel-2.4.23-28 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
AND Package Information
NetworkManager-1.0.12-13.6 is installed
OR NetworkManager-devel-1.0.12-13.6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 is installed
AND Package Information
gcc48-gij-4.8.3+r212056-6 is installed
OR gcc48-gij-32bit-4.8.3+r212056-6 is installed
OR libgcj48-4.8.3+r212056-6 is installed
OR libgcj48-32bit-4.8.3+r212056-6 is installed
OR libgcj48-jar-4.8.3+r212056-6 is installed
OR libgcj_bc1-4.8.3+r212056-6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
AND Package Information
gcc48-gij-4.8.5-24 is installed
OR gcc48-gij-32bit-4.8.5-24 is installed
OR libgcj48-4.8.5-24 is installed
OR libgcj48-32bit-4.8.5-24 is installed
OR libgcj48-jar-4.8.5-24 is installed
OR libgcj_bc1-4.8.5-24 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
AND bash-lang-4.3-78 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP3 is installed
AND cyrus-sasl-digestmd5-32bit-2.1.26-7 is installed
|