Oval Definition:oval:org.opensuse.security:def:6669
Revision Date:2021-05-12Version:1
Title:Security update for the Linux Kernel (Important)
Description:

The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.



The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509). - CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208). - CVE-2021-29155: Fixed an issue within kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations (bnc#1184942). - CVE-2020-36310: Fixed an issue in arch/x86/kvm/svm/svm.c that allowed a set_memory_region_test infinite loop for certain nested page faults (bnc#1184512). - CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583). - CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391). - CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181). - CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181). - CVE-2020-36311: Fixed an issue in arch/x86/kvm/svm/sev.c that allowed attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions) (bnc#1184511). - CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211). - CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211). - CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120). - CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393). - CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397). - CVE-2021-28964: Fixed a race condition in fs/btrfs/ctree.c that could have caused a denial of service because of a lack of locking on an extent buffer before a cloning operation (bnc#1184193). - CVE-2021-3444: Fixed the bpf verifier as it did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution (bnc#1184170). - CVE-2021-28971: Fixed a potential local denial of service in intel_pmu_drain_pebs_nhm where userspace applications can cause a system crash because the PEBS status in a PEBS record is mishandled (bnc#1184196). - CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646). - CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167). - CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168). - CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198). - CVE-2021-29647: Fixed an issue in kernel qrtr_recvmsg in net/qrtr/qrtr.c that allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bnc#1184192). - CVE-2020-27171: Fixed an issue in kernel/bpf/verifier.c that had an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bnc#1183686, bnc#1183775). - CVE-2020-27170: Fixed an issue in kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. This affects pointer types that do not define a ptr_limit (bnc#1183686 bnc#1183775). - CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593). - CVE-2020-35519: Update patch reference for x25 fix (bsc#1183696). - CVE-2021-3428: Fixed ext4 integer overflow in ext4_es_cache_extent (bsc#1173485, bsc#1183509). - CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720). - CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069). - CVE-2020-27815: Fixed jfs array index bounds check in dbAdjTree (bsc#1179454). - CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715). - CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716). - CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).

The following non-security bugs were fixed:

- Revert 'rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)' This turned out to be a bad idea: the kernel-$flavor-devel package must be usable without kernel-$flavor, e.g. at the build of a KMP. And this change brought superfluous installation of kernel-preempt when a system had kernel-syms (bsc#1185113). - Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). - bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). - bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775). - ext4: check journal inode extents more carefully (bsc#1173485). - ext4: do not allow overlapping system zones (bsc#1173485). - ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485). - hv: clear ring_buffer pointer during cleanup (part of ae6935ed) (bsc#1181032). - hv_netvsc: remove ndo_poll_controller (bsc#1185248). - macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). - post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388). - rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514). - rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063). - rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439) - rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244) - rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650) - xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
Family:unixClass:patch
Status:Reference(s):1047233
1173485
1176720
1177411
1178181
1179454
1181032
1182672
1182715
1182716
1182717
1183022
1183063
1183069
1183509
1183593
1183646
1183686
1183696
1183775
1184120
1184167
1184168
1184170
1184192
1184193
1184194
1184196
1184198
1184208
1184211
1184388
1184391
1184393
1184397
1184509
1184511
1184512
1184514
1184583
1184650
1184942
1185113
1185244
1185248
CVE-2006-7250
CVE-2008-5077
CVE-2009-0037
CVE-2009-0590
CVE-2009-0591
CVE-2009-0696
CVE-2009-0789
CVE-2009-0946
CVE-2009-1377
CVE-2009-1378
CVE-2009-1379
CVE-2009-1386
CVE-2009-1387
CVE-2009-2417
CVE-2009-4022
CVE-2010-0624
CVE-2010-0740
CVE-2010-0742
CVE-2010-1633
CVE-2010-2497
CVE-2010-2547
CVE-2010-2805
CVE-2010-2939
CVE-2010-3053
CVE-2010-3054
CVE-2010-3311
CVE-2010-3430
CVE-2010-3431
CVE-2010-3613
CVE-2010-3614
CVE-2010-3615
CVE-2010-3814
CVE-2010-3853
CVE-2010-3855
CVE-2010-3864
CVE-2010-5298
CVE-2011-0014
CVE-2011-0226
CVE-2011-0414
CVE-2011-1907
CVE-2011-1910
CVE-2011-2464
CVE-2011-3148
CVE-2011-3149
CVE-2011-3207
CVE-2011-3210
CVE-2011-3256
CVE-2011-3439
CVE-2011-4108
CVE-2011-4313
CVE-2011-4576
CVE-2011-4577
CVE-2011-4619
CVE-2012-0027
CVE-2012-0050
CVE-2012-0884
CVE-2012-1126
CVE-2012-1127
CVE-2012-1128
CVE-2012-1129
CVE-2012-1130
CVE-2012-1131
CVE-2012-1132
CVE-2012-1133
CVE-2012-1134
CVE-2012-1135
CVE-2012-1136
CVE-2012-1137
CVE-2012-1138
CVE-2012-1139
CVE-2012-1140
CVE-2012-1141
CVE-2012-1142
CVE-2012-1143
CVE-2012-1144
CVE-2012-1165
CVE-2012-1667
CVE-2012-2110
CVE-2012-2686
CVE-2012-3817
CVE-2012-3868
CVE-2012-4244
CVE-2012-4929
CVE-2012-5166
CVE-2012-5668
CVE-2012-5669
CVE-2012-5670
CVE-2012-5688
CVE-2012-5689
CVE-2013-0166
CVE-2013-0169
CVE-2013-0249
CVE-2013-1944
CVE-2013-1987
CVE-2013-2142
CVE-2013-2174
CVE-2013-2266
CVE-2013-4238
CVE-2013-4314
CVE-2013-4351
CVE-2013-4353
CVE-2013-4402
CVE-2013-4545
CVE-2013-4854
CVE-2013-6449
CVE-2013-6450
CVE-2014-0015
CVE-2014-0076
CVE-2014-0138
CVE-2014-0139
CVE-2014-0160
CVE-2014-0195
CVE-2014-0198
CVE-2014-0221
CVE-2014-0224
CVE-2014-0591
CVE-2014-2240
CVE-2014-2241
CVE-2014-2583
CVE-2014-3065
CVE-2014-3430
CVE-2014-3470
CVE-2014-3505
CVE-2014-3506
CVE-2014-3507
CVE-2014-3508
CVE-2014-3509
CVE-2014-3510
CVE-2014-3511
CVE-2014-3512
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
CVE-2014-3569
CVE-2014-3570
CVE-2014-3571
CVE-2014-3572
CVE-2014-3613
CVE-2014-3620
CVE-2014-3707
CVE-2014-4288
CVE-2014-4607
CVE-2014-4617
CVE-2014-5139
CVE-2014-6456
CVE-2014-6457
CVE-2014-6458
CVE-2014-6466
CVE-2014-6476
CVE-2014-6492
CVE-2014-6493
CVE-2014-6502
CVE-2014-6503
CVE-2014-6506
CVE-2014-6511
CVE-2014-6512
CVE-2014-6513
CVE-2014-6515
CVE-2014-6527
CVE-2014-6531
CVE-2014-6532
CVE-2014-6558
CVE-2014-8150
CVE-2014-8275
CVE-2014-8500
CVE-2014-8891
CVE-2014-8892
CVE-2014-9112
CVE-2014-9656
CVE-2014-9657
CVE-2014-9658
CVE-2014-9659
CVE-2014-9660
CVE-2014-9661
CVE-2014-9662
CVE-2014-9663
CVE-2014-9664
CVE-2014-9665
CVE-2014-9666
CVE-2014-9667
CVE-2014-9668
CVE-2014-9669
CVE-2014-9670
CVE-2014-9671
CVE-2014-9672
CVE-2014-9673
CVE-2014-9674
CVE-2014-9675
CVE-2015-0138
CVE-2015-0192
CVE-2015-0204
CVE-2015-0204
CVE-2015-0205
CVE-2015-0206
CVE-2015-0209
CVE-2015-0286
CVE-2015-0287
CVE-2015-0288
CVE-2015-0289
CVE-2015-0293
CVE-2015-0458
CVE-2015-0459
CVE-2015-0469
CVE-2015-0477
CVE-2015-0478
CVE-2015-0480
CVE-2015-0488
CVE-2015-0491
CVE-2015-1349
CVE-2015-1606
CVE-2015-1607
CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2015-1793
CVE-2015-1794
CVE-2015-1914
CVE-2015-1931
CVE-2015-2590
CVE-2015-2601
CVE-2015-2613
CVE-2015-2619
CVE-2015-2621
CVE-2015-2625
CVE-2015-2632
CVE-2015-2637
CVE-2015-2638
CVE-2015-2664
CVE-2015-2808
CVE-2015-3143
CVE-2015-3144
CVE-2015-3145
CVE-2015-3148
CVE-2015-3153
CVE-2015-3193
CVE-2015-3194
CVE-2015-3195
CVE-2015-3196
CVE-2015-3197
CVE-2015-3236
CVE-2015-3237
CVE-2015-3238
CVE-2015-4000
CVE-2015-4620
CVE-2015-4729
CVE-2015-4731
CVE-2015-4732
CVE-2015-4733
CVE-2015-4734
CVE-2015-4748
CVE-2015-4749
CVE-2015-4760
CVE-2015-4803
CVE-2015-4805
CVE-2015-4806
CVE-2015-4810
CVE-2015-4835
CVE-2015-4840
CVE-2015-4842
CVE-2015-4843
CVE-2015-4844
CVE-2015-4860
CVE-2015-4871
CVE-2015-4872
CVE-2015-4882
CVE-2015-4883
CVE-2015-4893
CVE-2015-4902
CVE-2015-4903
CVE-2015-4911
CVE-2015-5006
CVE-2015-5041
CVE-2015-5477
CVE-2015-5722
CVE-2015-7575
CVE-2015-7981
CVE-2015-8000
CVE-2015-8126
CVE-2015-8472
CVE-2015-8540
CVE-2015-8704
CVE-2016-0264
CVE-2016-0363
CVE-2016-0376
CVE-2016-0402
CVE-2016-0448
CVE-2016-0466
CVE-2016-0483
CVE-2016-0494
CVE-2016-0686
CVE-2016-0687
CVE-2016-0701
CVE-2016-0702
CVE-2016-0705
CVE-2016-0755
CVE-2016-0772
CVE-2016-0797
CVE-2016-0798
CVE-2016-0800
CVE-2016-1000110
CVE-2016-10165
CVE-2016-1285
CVE-2016-1286
CVE-2016-2037
CVE-2016-2105
CVE-2016-2106
CVE-2016-2107
CVE-2016-2109
CVE-2016-2176
CVE-2016-2177
CVE-2016-2178
CVE-2016-2179
CVE-2016-2180
CVE-2016-2181
CVE-2016-2182
CVE-2016-2183
CVE-2016-2183
CVE-2016-2775
CVE-2016-2776
CVE-2016-3422
CVE-2016-3426
CVE-2016-3427
CVE-2016-3443
CVE-2016-3449
CVE-2016-3485
CVE-2016-3511
CVE-2016-3598
CVE-2016-4983
CVE-2016-5104
CVE-2016-5419
CVE-2016-5420
CVE-2016-5421
CVE-2016-5542
CVE-2016-5554
CVE-2016-5556
CVE-2016-5568
CVE-2016-5573
CVE-2016-5597
CVE-2016-5636
CVE-2016-5699
CVE-2016-6170
CVE-2016-6302
CVE-2016-6303
CVE-2016-6304
CVE-2016-6306
CVE-2016-7052
CVE-2016-7055
CVE-2016-7056
CVE-2016-7141
CVE-2016-7167
CVE-2016-7949
CVE-2016-7950
CVE-2016-8615
CVE-2016-8616
CVE-2016-8617
CVE-2016-8618
CVE-2016-8619
CVE-2016-8620
CVE-2016-8621
CVE-2016-8622
CVE-2016-8623
CVE-2016-8624
CVE-2016-8625
CVE-2016-8864
CVE-2016-9131
CVE-2016-9147
CVE-2016-9444
CVE-2016-9586
CVE-2016-9594
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2016-9843
CVE-2017-1000099
CVE-2017-1000100
CVE-2017-1000101
CVE-2017-1000158
CVE-2017-1000254
CVE-2017-1000257
CVE-2017-10053
CVE-2017-10067
CVE-2017-10074
CVE-2017-10081
CVE-2017-10087
CVE-2017-10089
CVE-2017-10090
CVE-2017-10096
CVE-2017-10101
CVE-2017-10102
CVE-2017-10105
CVE-2017-10107
CVE-2017-10108
CVE-2017-10109
CVE-2017-10110
CVE-2017-10111
CVE-2017-10115
CVE-2017-10116
CVE-2017-10125
CVE-2017-10243
CVE-2017-10281
CVE-2017-10285
CVE-2017-10293
CVE-2017-10295
CVE-2017-10345
CVE-2017-10346
CVE-2017-10347
CVE-2017-10348
CVE-2017-10349
CVE-2017-10350
CVE-2017-10355
CVE-2017-10356
CVE-2017-10357
CVE-2017-10388
CVE-2017-1289
CVE-2017-14461
CVE-2017-15130
CVE-2017-15132
CVE-2017-18207
CVE-2017-2629
CVE-2017-2669
CVE-2017-3135
CVE-2017-3136
CVE-2017-3137
CVE-2017-3138
CVE-2017-3142
CVE-2017-3143
CVE-2017-3145
CVE-2017-3509
CVE-2017-3511
CVE-2017-3512
CVE-2017-3514
CVE-2017-3533
CVE-2017-3539
CVE-2017-3544
CVE-2017-3731
CVE-2017-3732
CVE-2017-7407
CVE-2017-7468
CVE-2017-8779
CVE-2017-8816
CVE-2017-8817
CVE-2017-8818
CVE-2017-9502
CVE-2018-0500
CVE-2018-1000005
CVE-2018-1000007
CVE-2018-1000030
CVE-2018-1000120
CVE-2018-1000121
CVE-2018-1000122
CVE-2018-1000300
CVE-2018-1000301
CVE-2018-1000802
CVE-2018-1000807
CVE-2018-1000808
CVE-2018-11212
CVE-2018-12020
CVE-2018-12539
CVE-2018-12547
CVE-2018-13785
CVE-2018-1417
CVE-2018-14618
CVE-2018-1517
CVE-2018-1656
CVE-2018-16839
CVE-2018-16840
CVE-2018-16842
CVE-2018-16890
CVE-2018-2579
CVE-2018-2582
CVE-2018-2588
CVE-2018-2599
CVE-2018-2602
CVE-2018-2603
CVE-2018-2618
CVE-2018-2633
CVE-2018-2634
CVE-2018-2637
CVE-2018-2641
CVE-2018-2657
CVE-2018-2663
CVE-2018-2677
CVE-2018-2678
CVE-2018-2783
CVE-2018-2790
CVE-2018-2794
CVE-2018-2795
CVE-2018-2796
CVE-2018-2797
CVE-2018-2798
CVE-2018-2799
CVE-2018-2800
CVE-2018-2814
CVE-2018-2940
CVE-2018-2952
CVE-2018-2973
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3169
CVE-2018-3180
CVE-2018-3214
CVE-2018-5740
CVE-2018-5743
CVE-2018-5745
CVE-2019-10245
CVE-2019-11500
CVE-2019-11771
CVE-2019-11775
CVE-2019-13050
CVE-2019-2422
CVE-2019-2426
CVE-2019-2602
CVE-2019-2684
CVE-2019-2697
CVE-2019-2698
CVE-2019-2762
CVE-2019-2766
CVE-2019-2769
CVE-2019-2816
CVE-2019-3814
CVE-2019-3822
CVE-2019-3823
CVE-2019-4473
CVE-2019-5436
CVE-2019-5481
CVE-2019-5482
CVE-2019-6465
CVE-2019-6471
CVE-2019-7317
CVE-2019-7524
CVE-2020-0433
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
CVE-2020-27170
CVE-2020-27171
CVE-2020-27673
CVE-2020-27815
CVE-2020-35519
CVE-2020-36310
CVE-2020-36311
CVE-2020-36312
CVE-2020-36322
CVE-2021-20219
CVE-2021-27363
CVE-2021-27364
CVE-2021-27365
CVE-2021-28038
CVE-2021-28660
CVE-2021-28688
CVE-2021-28950
CVE-2021-28964
CVE-2021-28971
CVE-2021-28972
CVE-2021-29154
CVE-2021-29155
CVE-2021-29264
CVE-2021-29265
CVE-2021-29647
CVE-2021-29650
CVE-2021-30002
CVE-2021-3428
CVE-2021-3444
CVE-2021-3483
SUSE-SU-2021:1573-1
Platform(s):openSUSE 13.1
openSUSE 13.1 NonFree
openSUSE 13.2
openSUSE 13.2 NonFree
openSUSE Leap 42.1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 11 SP4
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise for SAP 11 SP2
SUSE Linux Enterprise for SAP 11 SP4
SUSE Linux Enterprise for SAP 12
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP4
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise High Performance Computing 15
SUSE Linux Enterprise Module for Live Patching 15
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Module for Toolchain 12
SUSE Linux Enterprise Module for Web Scripting 12
SUSE Linux Enterprise Point of Sale 11 SP3
SUSE Linux Enterprise Point of Sale 12 SP2
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT
SUSE Linux Enterprise Real Time Extension 11 SP4
SUSE Linux Enterprise Real Time Extension 12 SP1
SUSE Linux Enterprise Real Time Extension 12 SP2
SUSE Linux Enterprise Real Time Extension 12 SP3
SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server 11-SECURITY
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 15
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP4
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Software Development Kit 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP4
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Workstation Extension 12 SP1
SUSE Linux Enterprise Workstation Extension 12 SP2
SUSE Linux Enterprise Workstation Extension 12 SP3
SUSE OpenStack Cloud 5
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP2 is installed
  • AND Package Information
  • MozillaFirefox-17.0.9esr-0.3.1 is installed
  • OR MozillaFirefox-translations-17.0.9esr-0.3.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP4 is installed
  • AND Package Information
  • gpg2-2.0.9-25.33.41.2 is installed
  • OR gpg2-lang-2.0.9-25.33.41.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 is installed
  • AND Package Information
  • openssh-6.6p1-33 is installed
  • OR openssh-askpass-gnome-6.6p1-33 is installed
  • OR openssh-helpers-6.6p1-33 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP1 is installed
  • AND Package Information
  • compat-openssl098-0.9.8j-87 is installed
  • OR libopenssl0_9_8-0.9.8j-87 is installed
  • OR libopenssl0_9_8-32bit-0.9.8j-87 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP2 is installed
  • AND Package Information
  • bind-9.9.9P1-49 is installed
  • OR bind-libs-9.9.9P1-49 is installed
  • OR bind-libs-32bit-9.9.9P1-49 is installed
  • OR bind-utils-9.9.9P1-49 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP3 is installed
  • AND Package Information
  • libXrender1-0.9.8-7 is installed
  • OR libXrender1-32bit-0.9.8-7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 11 SP2 is installed
  • AND Package Information
  • compat-openssl097g-0.9.7g-146.22.1 is installed
  • OR compat-openssl097g-32bit-0.9.7g-146.22.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 11 SP4 is installed
  • AND Package Information
  • compat-openssl097g-0.9.7g-146.22.36.1 is installed
  • OR compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 12 is installed
  • AND Package Information
  • kgraft-patch-3_12_60-52_54-default-2-2 is installed
  • OR kgraft-patch-3_12_60-52_54-xen-2-2 is installed
  • OR kgraft-patch-SLE12_Update_15-2-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability Extension 11 SP3 is installed
  • AND ctdb-1.0.114.6-0.11.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability Extension 11 SP4 is installed
  • AND Package Information
  • hawk-0.7.0+git.1430140184.8e872c5-7.1 is installed
  • OR hawk-templates-0.7.0+git.1430140184.8e872c5-7.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Performance Computing 12 SP5 is installed
  • AND Package Information
  • bind-9.11.2-3.10 is installed
  • OR bind-chrootenv-9.11.2-3.10 is installed
  • OR bind-doc-9.11.2-3.10 is installed
  • OR bind-utils-9.11.2-3.10 is installed
  • OR libbind9-160-9.11.2-3.10 is installed
  • OR libdns169-9.11.2-3.10 is installed
  • OR libirs160-9.11.2-3.10 is installed
  • OR libisc166-9.11.2-3.10 is installed
  • OR libisc166-32bit-9.11.2-3.10 is installed
  • OR libisccc160-9.11.2-3.10 is installed
  • OR libisccfg160-9.11.2-3.10 is installed
  • OR liblwres160-9.11.2-3.10 is installed
  • OR python-bind-9.11.2-3.10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Live Patching 15 is installed
  • AND Package Information
  • kernel-default-livepatch-4.12.14-150.72.1 is installed
  • OR kernel-livepatch-4_12_14-150_72-default-1-1.3.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Public Cloud 12 is installed
  • AND Package Information
  • kernel-ec2-3.12.74-60.64.82 is installed
  • OR kernel-ec2-devel-3.12.74-60.64.82 is installed
  • OR kernel-ec2-extra-3.12.74-60.64.82 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Toolchain 12 is installed
  • AND Package Information
  • cpp5-5.3.1+r233831-9 is installed
  • OR gcc5-5.3.1+r233831-9 is installed
  • OR gcc5-32bit-5.3.1+r233831-9 is installed
  • OR gcc5-ada-5.3.1+r233831-9 is installed
  • OR gcc5-ada-32bit-5.3.1+r233831-9 is installed
  • OR gcc5-c++-5.3.1+r233831-9 is installed
  • OR gcc5-c++-32bit-5.3.1+r233831-9 is installed
  • OR gcc5-fortran-5.3.1+r233831-9 is installed
  • OR gcc5-fortran-32bit-5.3.1+r233831-9 is installed
  • OR gcc5-info-5.3.1+r233831-9 is installed
  • OR gcc5-locale-5.3.1+r233831-9 is installed
  • OR libada5-5.3.1+r233831-9 is installed
  • OR libada5-32bit-5.3.1+r233831-9 is installed
  • OR libffi-devel-gcc5-5.3.1+r233831-9 is installed
  • OR libffi-devel-gcc5-32bit-5.3.1+r233831-9 is installed
  • OR libffi-gcc5-5.3.1+r233831-9 is installed
  • OR libstdc++6-devel-gcc5-5.3.1+r233831-9 is installed
  • OR libstdc++6-devel-gcc5-32bit-5.3.1+r233831-9 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Web Scripting 12 is installed
  • AND Package Information
  • apache2-mod_php5-5.5.14-30 is installed
  • OR php5-5.5.14-30 is installed
  • OR php5-bcmath-5.5.14-30 is installed
  • OR php5-bz2-5.5.14-30 is installed
  • OR php5-calendar-5.5.14-30 is installed
  • OR php5-ctype-5.5.14-30 is installed
  • OR php5-curl-5.5.14-30 is installed
  • OR php5-dba-5.5.14-30 is installed
  • OR php5-dom-5.5.14-30 is installed
  • OR php5-enchant-5.5.14-30 is installed
  • OR php5-exif-5.5.14-30 is installed
  • OR php5-fastcgi-5.5.14-30 is installed
  • OR php5-fileinfo-5.5.14-30 is installed
  • OR php5-fpm-5.5.14-30 is installed
  • OR php5-ftp-5.5.14-30 is installed
  • OR php5-gd-5.5.14-30 is installed
  • OR php5-gettext-5.5.14-30 is installed
  • OR php5-gmp-5.5.14-30 is installed
  • OR php5-iconv-5.5.14-30 is installed
  • OR php5-intl-5.5.14-30 is installed
  • OR php5-json-5.5.14-30 is installed
  • OR php5-ldap-5.5.14-30 is installed
  • OR php5-mbstring-5.5.14-30 is installed
  • OR php5-mcrypt-5.5.14-30 is installed
  • OR php5-mysql-5.5.14-30 is installed
  • OR php5-odbc-5.5.14-30 is installed
  • OR php5-openssl-5.5.14-30 is installed
  • OR php5-pcntl-5.5.14-30 is installed
  • OR php5-pdo-5.5.14-30 is installed
  • OR php5-pear-5.5.14-30 is installed
  • OR php5-pgsql-5.5.14-30 is installed
  • OR php5-pspell-5.5.14-30 is installed
  • OR php5-shmop-5.5.14-30 is installed
  • OR php5-snmp-5.5.14-30 is installed
  • OR php5-soap-5.5.14-30 is installed
  • OR php5-sockets-5.5.14-30 is installed
  • OR php5-sqlite-5.5.14-30 is installed
  • OR php5-suhosin-5.5.14-30 is installed
  • OR php5-sysvmsg-5.5.14-30 is installed
  • OR php5-sysvsem-5.5.14-30 is installed
  • OR php5-sysvshm-5.5.14-30 is installed
  • OR php5-tokenizer-5.5.14-30 is installed
  • OR php5-wddx-5.5.14-30 is installed
  • OR php5-xmlreader-5.5.14-30 is installed
  • OR php5-xmlrpc-5.5.14-30 is installed
  • OR php5-xmlwriter-5.5.14-30 is installed
  • OR php5-xsl-5.5.14-30 is installed
  • OR php5-zip-5.5.14-30 is installed
  • OR php5-zlib-5.5.14-30 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Point of Sale 11 SP3 is installed
  • AND Package Information
  • bind-9.9.6P1-0.33.1 is installed
  • OR bind-chrootenv-9.9.6P1-0.33.1 is installed
  • OR bind-doc-9.9.6P1-0.33.1 is installed
  • OR bind-libs-9.9.6P1-0.33.1 is installed
  • OR bind-utils-9.9.6P1-0.33.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Point of Sale 12 SP2 is installed
  • AND Package Information
  • salt-2016.11.4-46.7 is installed
  • OR salt-minion-2016.11.4-46.7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT is installed
  • AND Package Information
  • kernel-firmware-20170530-21.22 is installed
  • OR ucode-amd-20170530-21.22 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 11 SP4 is installed
  • AND Package Information
  • kernel-rt-3.0.101.rt130-54.1 is installed
  • OR kernel-rt-base-3.0.101.rt130-54.1 is installed
  • OR kernel-rt-devel-3.0.101.rt130-54.1 is installed
  • OR kernel-rt_trace-3.0.101.rt130-54.1 is installed
  • OR kernel-rt_trace-base-3.0.101.rt130-54.1 is installed
  • OR kernel-rt_trace-devel-3.0.101.rt130-54.1 is installed
  • OR kernel-source-rt-3.0.101.rt130-54.1 is installed
  • OR kernel-syms-rt-3.0.101.rt130-54.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 12 SP1 is installed
  • AND Package Information
  • kernel-compute-3.12.69-60.30 is installed
  • OR kernel-compute-base-3.12.69-60.30 is installed
  • OR kernel-compute-devel-3.12.69-60.30 is installed
  • OR kernel-compute_debug-3.12.69-60.30 is installed
  • OR kernel-compute_debug-devel-3.12.69-60.30 is installed
  • OR kernel-devel-rt-3.12.69-60.30 is installed
  • OR kernel-rt-3.12.69-60.30 is installed
  • OR kernel-rt-base-3.12.69-60.30 is installed
  • OR kernel-rt-devel-3.12.69-60.30 is installed
  • OR kernel-rt_debug-3.12.69-60.30 is installed
  • OR kernel-rt_debug-devel-3.12.69-60.30 is installed
  • OR kernel-source-rt-3.12.69-60.30 is installed
  • OR kernel-syms-rt-3.12.69-60.30 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 12 SP2 is installed
  • AND Package Information
  • cluster-md-kmp-rt-4.4.114-27 is installed
  • OR cluster-network-kmp-rt-4.4.114-27 is installed
  • OR dlm-kmp-rt-4.4.114-27 is installed
  • OR gfs2-kmp-rt-4.4.114-27 is installed
  • OR kernel-devel-rt-4.4.114-27 is installed
  • OR kernel-rt-4.4.114-27 is installed
  • OR kernel-rt-base-4.4.114-27 is installed
  • OR kernel-rt-devel-4.4.114-27 is installed
  • OR kernel-rt_debug-4.4.114-27 is installed
  • OR kernel-rt_debug-devel-4.4.114-27 is installed
  • OR kernel-source-rt-4.4.114-27 is installed
  • OR kernel-syms-rt-4.4.114-27 is installed
  • OR ocfs2-kmp-rt-4.4.114-27 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 12 SP3 is installed
  • AND Package Information
  • cluster-md-kmp-rt-4.4.128-3.11 is installed
  • OR dlm-kmp-rt-4.4.128-3.11 is installed
  • OR gfs2-kmp-rt-4.4.128-3.11 is installed
  • OR kernel-devel-rt-4.4.128-3.11 is installed
  • OR kernel-rt-4.4.128-3.11 is installed
  • OR kernel-rt-base-4.4.128-3.11 is installed
  • OR kernel-rt-devel-4.4.128-3.11 is installed
  • OR kernel-rt_debug-4.4.128-3.11 is installed
  • OR kernel-rt_debug-devel-4.4.128-3.11 is installed
  • OR kernel-source-rt-4.4.128-3.11 is installed
  • OR kernel-syms-rt-4.4.128-3.11 is installed
  • OR ocfs2-kmp-rt-4.4.128-3.11 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 is installed
  • AND Package Information
  • libMagickCore1-6.4.3.6-7.19.1 is installed
  • OR libMagickCore1-32bit-6.4.3.6-7.19.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP1 is installed
  • AND Package Information
  • libsnmp15-5.4.2.1-8.2.1 is installed
  • OR libsnmp15-32bit-5.4.2.1-8.2.1 is installed
  • OR libsnmp15-x86-5.4.2.1-8.2.1 is installed
  • OR net-snmp-5.4.2.1-8.2.1 is installed
  • OR perl-SNMP-5.4.2.1-8.2.1 is installed
  • OR snmp-mibs-5.4.2.1-8.2.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed
  • AND Package Information
  • rhn-virtualization-common-5.4.15-0.15.2 is installed
  • OR rhn-virtualization-host-5.4.15-0.15.2 is installed
  • OR rhncfg-5.9.33-0.20.1 is installed
  • OR rhncfg-actions-5.9.33-0.20.1 is installed
  • OR rhncfg-client-5.9.33-0.20.1 is installed
  • OR rhncfg-management-5.9.33-0.20.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP2 is installed
  • AND Package Information
  • MozillaFirefox-10.0-0.3.2 is installed
  • OR MozillaFirefox-translations-10.0-0.3.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP3 is installed
  • AND squid-2.7.STABLE5-2.12.12.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP4 is installed
  • AND apache2-mod_jk-1.2.40-0.2.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11-SECURITY is installed
  • AND Package Information
  • libopenssl1-devel-1.0.1g-0.35.1 is installed
  • OR libopenssl1_0_0-1.0.1g-0.35.1 is installed
  • OR libopenssl1_0_0-32bit-1.0.1g-0.35.1 is installed
  • OR libopenssl1_0_0-x86-1.0.1g-0.35.1 is installed
  • OR openssl1-1.0.1g-0.35.1 is installed
  • OR openssl1-doc-1.0.1g-0.35.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 is installed
  • AND Package Information
  • bind-9.9.5P1-1 is installed
  • OR bind-chrootenv-9.9.5P1-1 is installed
  • OR bind-doc-9.9.5P1-1 is installed
  • OR bind-libs-9.9.5P1-1 is installed
  • OR bind-libs-32bit-9.9.5P1-1 is installed
  • OR bind-utils-9.9.5P1-1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1 is installed
  • AND apache2-mod_nss-1.0.8-13 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • glib2-lang-2.48.2-10 is installed
  • OR glib2-tools-2.48.2-10 is installed
  • OR libgio-2_0-0-2.48.2-10 is installed
  • OR libgio-2_0-0-32bit-2.48.2-10 is installed
  • OR libglib-2_0-0-2.48.2-10 is installed
  • OR libglib-2_0-0-32bit-2.48.2-10 is installed
  • OR libgmodule-2_0-0-2.48.2-10 is installed
  • OR libgmodule-2_0-0-32bit-2.48.2-10 is installed
  • OR libgobject-2_0-0-2.48.2-10 is installed
  • OR libgobject-2_0-0-32bit-2.48.2-10 is installed
  • OR libgthread-2_0-0-2.48.2-10 is installed
  • OR libgthread-2_0-0-32bit-2.48.2-10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • coreutils-8.25-12 is installed
  • OR coreutils-lang-8.25-12 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • augeas-1.2.0-17.3 is installed
  • OR augeas-lenses-1.2.0-17.3 is installed
  • OR libaugeas0-1.2.0-17.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP5 is installed
  • AND Package Information
  • apache2-2.4.23-29.43 is installed
  • OR apache2-doc-2.4.23-29.43 is installed
  • OR apache2-example-pages-2.4.23-29.43 is installed
  • OR apache2-prefork-2.4.23-29.43 is installed
  • OR apache2-utils-2.4.23-29.43 is installed
  • OR apache2-worker-2.4.23-29.43 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12-LTSS is installed
  • AND Package Information
  • kgraft-patch-3_12_44-52_18-default-6-2.2 is installed
  • OR kgraft-patch-3_12_44-52_18-xen-6-2.2 is installed
  • OR kgraft-patch-SLE12_Update_7-6-2.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
  • AND Package Information
  • ghostscript-9.15-17 is installed
  • OR ghostscript-x11-9.15-17 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
  • AND Package Information
  • liblcms-devel-1.17-77.16.1 is installed
  • OR liblcms-devel-32bit-1.17-77.16.1 is installed
  • OR python-lcms-1.17-77.16.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
  • AND Package Information
  • ImageMagick-6.4.3.6-7.30.1 is installed
  • OR ImageMagick-devel-6.4.3.6-7.30.1 is installed
  • OR libMagick++-devel-6.4.3.6-7.30.1 is installed
  • OR libMagick++1-6.4.3.6-7.30.1 is installed
  • OR libMagickWand1-6.4.3.6-7.30.1 is installed
  • OR libMagickWand1-32bit-6.4.3.6-7.30.1 is installed
  • OR perl-PerlMagick-6.4.3.6-7.30.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
  • AND Package Information
  • libdrm-devel-2.4.52-0.7.1 is installed
  • OR libdrm-devel-32bit-2.4.52-0.7.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 is installed
  • AND mercurial-2.8.2-9 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
  • AND Package Information
  • MozillaFirefox-38.5.0esr-54 is installed
  • OR MozillaFirefox-devel-38.5.0esr-54 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
  • AND dovecot22-devel-2.2.13-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
  • AND apache2-devel-2.4.23-28 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
  • AND Package Information
  • NetworkManager-1.0.12-13.6 is installed
  • OR NetworkManager-devel-1.0.12-13.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 is installed
  • AND Package Information
  • gcc48-gij-4.8.3+r212056-6 is installed
  • OR gcc48-gij-32bit-4.8.3+r212056-6 is installed
  • OR libgcj48-4.8.3+r212056-6 is installed
  • OR libgcj48-32bit-4.8.3+r212056-6 is installed
  • OR libgcj48-jar-4.8.3+r212056-6 is installed
  • OR libgcj_bc1-4.8.3+r212056-6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
  • AND Package Information
  • gcc48-gij-4.8.5-24 is installed
  • OR gcc48-gij-32bit-4.8.5-24 is installed
  • OR libgcj48-4.8.5-24 is installed
  • OR libgcj48-32bit-4.8.5-24 is installed
  • OR libgcj48-jar-4.8.5-24 is installed
  • OR libgcj_bc1-4.8.5-24 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
  • AND bash-lang-4.3-78 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP3 is installed
  • AND cyrus-sasl-digestmd5-32bit-2.1.26-7 is installed
  • BACK