Oval Definition:oval:org.opensuse.security:def:6727
Revision Date:2021-02-11Version:1
Title:Security update for the Linux Kernel (Important)
Description:

The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.



The following security bugs were fixed:

- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504). - CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349). - CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395). - CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878). - CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509). - CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508). - CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). - CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). - CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). - CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666). - CVE-2020-10781: A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable (bnc#1173074). - CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141). - CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). - CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846). - CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). - CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601). - CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960). - CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). - CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). - CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589). - CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886). - CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372). - CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182). - CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/storage.c where uninitialized memory leaks to userspace (bnc#1179429). - CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140). - CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). - CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952). - CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663). - CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service (bnc#1172199).

The following non-security bugs were fixed:

- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840 bsc#1179071). - blk-mq: make sure that line break can be printed (bsc#1163840 bsc#1179071). - epoll: Keep a reference on files added to the check list (bsc#1180031). - fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes). - futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032). - futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032). - futex: Fix incorrect should_fail_futex() handling (bsc#1181349). - futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032). - futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032). - futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032). - futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032). - futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032). - HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052). - iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191). - iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191). - kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191). - locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032). - nbd: Fix memory leak in nbd_add_socket (bsc#1181504). - net/x25: prevent a couple of overflows (bsc#1178590). - rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032). - s390/dasd: fix hanging device offline processing (bsc#1144912). - scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272). - x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191). - x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191). - x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191). - x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191). - x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191). - x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191). - x86/tracing: Introduce a static key for exception tracing (bsc#1179895). - x86/traps: Simplify pagefault tracing logic (bsc#1179895).
Family:unixClass:patch
Status:Reference(s):1144912
1149032
1163840
1168952
1172199
1173074
1173942
1176395
1176846
1177666
1178182
1178272
1178372
1178589
1178590
1178684
1178886
1179071
1179107
1179140
1179141
1179419
1179429
1179508
1179509
1179601
1179616
1179663
1179666
1179745
1179877
1179878
1179895
1179960
1179961
1180008
1180027
1180028
1180029
1180030
1180031
1180032
1180052
1180086
1180559
1180562
1180676
1181001
1181158
1181349
1181504
1181553
1181645
CVE-2008-1420
CVE-2009-3379
CVE-2009-3627
CVE-2009-5029
CVE-2009-5155
CVE-2010-1163
CVE-2010-1646
CVE-2011-0010
CVE-2012-0444
CVE-2012-2150
CVE-2012-2337
CVE-2012-2669
CVE-2012-3406
CVE-2012-4412
CVE-2012-5532
CVE-2013-0242
CVE-2013-1775
CVE-2013-1776
CVE-2013-1914
CVE-2013-2002
CVE-2013-2005
CVE-2013-2207
CVE-2013-4237
CVE-2013-4332
CVE-2013-4458
CVE-2013-7423
CVE-2014-0475
CVE-2014-3065
CVE-2014-3467
CVE-2014-3468
CVE-2014-3469
CVE-2014-3566
CVE-2014-4043
CVE-2014-4288
CVE-2014-5119
CVE-2014-6040
CVE-2014-6456
CVE-2014-6457
CVE-2014-6458
CVE-2014-6466
CVE-2014-6476
CVE-2014-6492
CVE-2014-6493
CVE-2014-6502
CVE-2014-6503
CVE-2014-6506
CVE-2014-6511
CVE-2014-6512
CVE-2014-6513
CVE-2014-6515
CVE-2014-6527
CVE-2014-6531
CVE-2014-6532
CVE-2014-6558
CVE-2014-7817
CVE-2014-8121
CVE-2014-8891
CVE-2014-8892
CVE-2014-9402
CVE-2014-9680
CVE-2014-9761
CVE-2015-0138
CVE-2015-0192
CVE-2015-0204
CVE-2015-0458
CVE-2015-0459
CVE-2015-0469
CVE-2015-0477
CVE-2015-0478
CVE-2015-0480
CVE-2015-0488
CVE-2015-0491
CVE-2015-1419
CVE-2015-1472
CVE-2015-1473
CVE-2015-1781
CVE-2015-1914
CVE-2015-1931
CVE-2015-2590
CVE-2015-2601
CVE-2015-2613
CVE-2015-2619
CVE-2015-2621
CVE-2015-2625
CVE-2015-2632
CVE-2015-2637
CVE-2015-2638
CVE-2015-2664
CVE-2015-2806
CVE-2015-2808
CVE-2015-3622
CVE-2015-4000
CVE-2015-4729
CVE-2015-4731
CVE-2015-4732
CVE-2015-4733
CVE-2015-4734
CVE-2015-4748
CVE-2015-4749
CVE-2015-4760
CVE-2015-4803
CVE-2015-4805
CVE-2015-4806
CVE-2015-4810
CVE-2015-4835
CVE-2015-4840
CVE-2015-4842
CVE-2015-4843
CVE-2015-4844
CVE-2015-4860
CVE-2015-4871
CVE-2015-4872
CVE-2015-4882
CVE-2015-4883
CVE-2015-4893
CVE-2015-4902
CVE-2015-4903
CVE-2015-4911
CVE-2015-5006
CVE-2015-5041
CVE-2015-5180
CVE-2015-7547
CVE-2015-7575
CVE-2015-7981
CVE-2015-8126
CVE-2015-8472
CVE-2015-8540
CVE-2015-8776
CVE-2015-8777
CVE-2015-8778
CVE-2015-8779
CVE-2016-0264
CVE-2016-0363
CVE-2016-0376
CVE-2016-0402
CVE-2016-0448
CVE-2016-0466
CVE-2016-0483
CVE-2016-0494
CVE-2016-0686
CVE-2016-0687
CVE-2016-10165
CVE-2016-10198
CVE-2016-10199
CVE-2016-10739
CVE-2016-1234
CVE-2016-2183
CVE-2016-2399
CVE-2016-3075
CVE-2016-3422
CVE-2016-3426
CVE-2016-3427
CVE-2016-3443
CVE-2016-3449
CVE-2016-3485
CVE-2016-3511
CVE-2016-3598
CVE-2016-3706
CVE-2016-4008
CVE-2016-4429
CVE-2016-5542
CVE-2016-5554
CVE-2016-5556
CVE-2016-5568
CVE-2016-5573
CVE-2016-5597
CVE-2016-6354
CVE-2016-7032
CVE-2016-7076
CVE-2016-9634
CVE-2016-9635
CVE-2016-9636
CVE-2016-9807
CVE-2016-9808
CVE-2016-9810
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2016-9843
CVE-2017-1000366
CVE-2017-1000367
CVE-2017-1000368
CVE-2017-1000408
CVE-2017-1000409
CVE-2017-10053
CVE-2017-10067
CVE-2017-10074
CVE-2017-10081
CVE-2017-10087
CVE-2017-10089
CVE-2017-10090
CVE-2017-10096
CVE-2017-10101
CVE-2017-10102
CVE-2017-10105
CVE-2017-10107
CVE-2017-10108
CVE-2017-10109
CVE-2017-10110
CVE-2017-10111
CVE-2017-10115
CVE-2017-10116
CVE-2017-10125
CVE-2017-10243
CVE-2017-10281
CVE-2017-10285
CVE-2017-10293
CVE-2017-10295
CVE-2017-10345
CVE-2017-10346
CVE-2017-10347
CVE-2017-10348
CVE-2017-10349
CVE-2017-10350
CVE-2017-10355
CVE-2017-10356
CVE-2017-10357
CVE-2017-10388
CVE-2017-11591
CVE-2017-11683
CVE-2017-12132
CVE-2017-12133
CVE-2017-1289
CVE-2017-14160
CVE-2017-14632
CVE-2017-14633
CVE-2017-14859
CVE-2017-14862
CVE-2017-14864
CVE-2017-15670
CVE-2017-15671
CVE-2017-15804
CVE-2017-16997
CVE-2017-17669
CVE-2017-18269
CVE-2017-2581
CVE-2017-2586
CVE-2017-2587
CVE-2017-3509
CVE-2017-3511
CVE-2017-3512
CVE-2017-3514
CVE-2017-3533
CVE-2017-3539
CVE-2017-3544
CVE-2017-5840
CVE-2017-5841
CVE-2017-5845
CVE-2017-6891
CVE-2017-8804
CVE-2017-9122
CVE-2017-9123
CVE-2017-9124
CVE-2017-9125
CVE-2017-9126
CVE-2017-9127
CVE-2017-9128
CVE-2018-1000001
CVE-2018-1000654
CVE-2018-10392
CVE-2018-10393
CVE-2018-10958
CVE-2018-10998
CVE-2018-11212
CVE-2018-11236
CVE-2018-11237
CVE-2018-11531
CVE-2018-12539
CVE-2018-12547
CVE-2018-13785
CVE-2018-1417
CVE-2018-1517
CVE-2018-1656
CVE-2018-2579
CVE-2018-2582
CVE-2018-2588
CVE-2018-2599
CVE-2018-2602
CVE-2018-2603
CVE-2018-2618
CVE-2018-2633
CVE-2018-2634
CVE-2018-2637
CVE-2018-2641
CVE-2018-2657
CVE-2018-2663
CVE-2018-2677
CVE-2018-2678
CVE-2018-2783
CVE-2018-2790
CVE-2018-2794
CVE-2018-2795
CVE-2018-2796
CVE-2018-2797
CVE-2018-2798
CVE-2018-2799
CVE-2018-2800
CVE-2018-2814
CVE-2018-2940
CVE-2018-2952
CVE-2018-2973
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3169
CVE-2018-3180
CVE-2018-3214
CVE-2018-5146
CVE-2018-6003
CVE-2018-6485
CVE-2018-6551
CVE-2019-10245
CVE-2019-11771
CVE-2019-11775
CVE-2019-14287
CVE-2019-20806
CVE-2019-20934
CVE-2019-2422
CVE-2019-2426
CVE-2019-2602
CVE-2019-2684
CVE-2019-2697
CVE-2019-2698
CVE-2019-2762
CVE-2019-2766
CVE-2019-2769
CVE-2019-2816
CVE-2019-4473
CVE-2019-7317
CVE-2019-9169
CVE-2020-0444
CVE-2020-0465
CVE-2020-0466
CVE-2020-10781
CVE-2020-11668
CVE-2020-15436
CVE-2020-15437
CVE-2020-25211
CVE-2020-25639
CVE-2020-25669
CVE-2020-27068
CVE-2020-27777
CVE-2020-27786
CVE-2020-27825
CVE-2020-27835
CVE-2020-28374
CVE-2020-28915
CVE-2020-28974
CVE-2020-29371
CVE-2020-29568
CVE-2020-29569
CVE-2020-29660
CVE-2020-29661
CVE-2020-36158
CVE-2020-4788
CVE-2021-3347
CVE-2021-3348
SUSE-SU-2021:0438-1
Platform(s):openSUSE 13.1
openSUSE 13.1 NonFree
openSUSE 13.2
openSUSE Leap 42.1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 11 SP4
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise for SAP 11 SP4
SUSE Linux Enterprise for SAP 12
SUSE Linux Enterprise High Availability Extension 11 SP4
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise High Performance Computing 15
SUSE Linux Enterprise Module for Legacy Software 12
SUSE Linux Enterprise Module for Live Patching 15
SUSE Linux Enterprise Module for Web Scripting 12
SUSE Linux Enterprise Point of Sale 11 SP3
SUSE Linux Enterprise Point of Sale 12 SP2
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT
SUSE Linux Enterprise Real Time Extension 11 SP1
SUSE Linux Enterprise Real Time Extension 11 SP4
SUSE Linux Enterprise Real Time Extension 12 SP1
SUSE Linux Enterprise Real Time Extension 12 SP2
SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 11 SP1-LTSS
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server 11-SECURITY
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 15
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP4
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Software Development Kit 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP4
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Workstation Extension 12 SP1
SUSE Linux Enterprise Workstation Extension 12 SP2
SUSE Linux Enterprise Workstation Extension 12 SP3
SUSE Linux Enterprise Workstation Extension 12 SP4
SUSE OpenStack Cloud 5
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP2 is installed
  • AND Package Information
  • Mesa-7.11.2-0.9.1 is installed
  • OR Mesa-32bit-7.11.2-0.9.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP3 is installed
  • AND Package Information
  • bind-9.9.6P1-0.19.1 is installed
  • OR bind-libs-9.9.6P1-0.19.1 is installed
  • OR bind-libs-32bit-9.9.6P1-0.19.1 is installed
  • OR bind-utils-9.9.6P1-0.19.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP4 is installed
  • AND rsync-3.0.4-2.49.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP1 is installed
  • AND Package Information
  • libidn-1.28-4 is installed
  • OR libidn11-1.28-4 is installed
  • OR libidn11-32bit-1.28-4 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP2 is installed
  • AND Package Information
  • tar-1.27.1-11 is installed
  • OR tar-lang-1.27.1-11 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP3 is installed
  • AND Package Information
  • libnetpbm11-10.66.3-7 is installed
  • OR libnetpbm11-32bit-10.66.3-7 is installed
  • OR netpbm-10.66.3-7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 11 SP4 is installed
  • AND Package Information
  • compat-openssl097g-0.9.7g-146.22.41.1 is installed
  • OR compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise for SAP 12 is installed
  • AND Package Information
  • kgraft-patch-3_12_60-52_49-default-3-2 is installed
  • OR kgraft-patch-3_12_60-52_49-xen-3-2 is installed
  • OR kgraft-patch-SLE12_Update_14-3-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability Extension 11 SP4 is installed
  • AND Package Information
  • gnutls-2.4.1-24.39.60.1 is installed
  • OR libgnutls-extra26-2.4.1-24.39.60.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Performance Computing 12 SP5 is installed
  • AND Package Information
  • glibc-2.22-100.15 is installed
  • OR glibc-32bit-2.22-100.15 is installed
  • OR glibc-devel-2.22-100.15 is installed
  • OR glibc-devel-32bit-2.22-100.15 is installed
  • OR glibc-html-2.22-100.15 is installed
  • OR glibc-i18ndata-2.22-100.15 is installed
  • OR glibc-info-2.22-100.15 is installed
  • OR glibc-locale-2.22-100.15 is installed
  • OR glibc-locale-32bit-2.22-100.15 is installed
  • OR glibc-profile-2.22-100.15 is installed
  • OR glibc-profile-32bit-2.22-100.15 is installed
  • OR nscd-2.22-100.15 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Live Patching 15 is installed
  • AND Package Information
  • kernel-default-livepatch-4.12.14-150.66.1 is installed
  • OR kernel-livepatch-4_12_14-150_66-default-1-1.3.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Legacy Software 12 is installed
  • AND Package Information
  • java-1_6_0-ibm-1.6.0_sr16.1-5 is installed
  • OR java-1_6_0-ibm-fonts-1.6.0_sr16.1-5 is installed
  • OR java-1_6_0-ibm-jdbc-1.6.0_sr16.1-5 is installed
  • OR java-1_6_0-ibm-plugin-1.6.0_sr16.1-5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Web Scripting 12 is installed
  • AND Package Information
  • libpython3_4m1_0-3.4.6-25.16 is installed
  • OR python3-3.4.6-25.16 is installed
  • OR python3-base-3.4.6-25.16 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Point of Sale 11 SP3 is installed
  • AND Package Information
  • POS_Image-Minimal3-3.4.0-18.1 is installed
  • OR POS_Image-Netboot-hooks-3.4.0-18.1 is installed
  • OR POS_Image-Tools-3.4.0-18.1 is installed
  • OR POS_Image3-3.5.5-18.1 is installed
  • OR POS_Migration-3.5.5-18.1 is installed
  • OR POS_Server-Admin3-3.5.5-18.1 is installed
  • OR POS_Server-AdminGUI-3.5.5-18.1 is installed
  • OR POS_Server-AdminTools3-3.5.5-18.1 is installed
  • OR POS_Server-BranchTools3-3.5.5-18.1 is installed
  • OR POS_Server-Modules3-3.5.5-18.1 is installed
  • OR POS_Server3-3.5.5-18.1 is installed
  • OR admind-1.9-18.1 is installed
  • OR admind-client-1.9-18.1 is installed
  • OR posbios-1.0-18.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Point of Sale 12 SP2 is installed
  • AND Package Information
  • salt-2016.11.4-46.7 is installed
  • OR salt-minion-2016.11.4-46.7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT is installed
  • AND Package Information
  • java-1_8_0-ibm-1.8.0_sr5.15-30.33 is installed
  • OR java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33 is installed
  • OR java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33 is installed
  • OR java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 11 SP1 is installed
  • AND ofed-kmp-rt-1.5.2_2.6.33.18_rt31_0.3-0.9.13.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 11 SP4 is installed
  • AND Package Information
  • kernel-rt-3.0.101.rt130-57.1 is installed
  • OR kernel-rt-base-3.0.101.rt130-57.1 is installed
  • OR kernel-rt-devel-3.0.101.rt130-57.1 is installed
  • OR kernel-rt_trace-3.0.101.rt130-57.1 is installed
  • OR kernel-rt_trace-base-3.0.101.rt130-57.1 is installed
  • OR kernel-rt_trace-devel-3.0.101.rt130-57.1 is installed
  • OR kernel-source-rt-3.0.101.rt130-57.1 is installed
  • OR kernel-syms-rt-3.0.101.rt130-57.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 12 SP1 is installed
  • AND Package Information
  • kernel-compute-3.12.58-14 is installed
  • OR kernel-compute-base-3.12.58-14 is installed
  • OR kernel-compute-devel-3.12.58-14 is installed
  • OR kernel-compute_debug-3.12.58-14 is installed
  • OR kernel-compute_debug-devel-3.12.58-14 is installed
  • OR kernel-devel-rt-3.12.58-14 is installed
  • OR kernel-rt-3.12.58-14 is installed
  • OR kernel-rt-base-3.12.58-14 is installed
  • OR kernel-rt-devel-3.12.58-14 is installed
  • OR kernel-rt_debug-3.12.58-14 is installed
  • OR kernel-rt_debug-devel-3.12.58-14 is installed
  • OR kernel-source-rt-3.12.58-14 is installed
  • OR kernel-syms-rt-3.12.58-14 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 12 SP2 is installed
  • AND Package Information
  • cluster-md-kmp-rt-4.4.104-24 is installed
  • OR cluster-network-kmp-rt-4.4.104-24 is installed
  • OR dlm-kmp-rt-4.4.104-24 is installed
  • OR gfs2-kmp-rt-4.4.104-24 is installed
  • OR kernel-devel-rt-4.4.104-24 is installed
  • OR kernel-rt-4.4.104-24 is installed
  • OR kernel-rt-base-4.4.104-24 is installed
  • OR kernel-rt-devel-4.4.104-24 is installed
  • OR kernel-rt_debug-4.4.104-24 is installed
  • OR kernel-rt_debug-devel-4.4.104-24 is installed
  • OR kernel-source-rt-4.4.104-24 is installed
  • OR kernel-syms-rt-4.4.104-24 is installed
  • OR ocfs2-kmp-rt-4.4.104-24 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 is installed
  • AND Package Information
  • libMagickCore1-6.4.3.6-7.19.1 is installed
  • OR libMagickCore1-32bit-6.4.3.6-7.19.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP1-LTSS is installed
  • AND Package Information
  • bind-9.6ESVR11W1-0.9.1 is installed
  • OR bind-chrootenv-9.6ESVR11W1-0.9.1 is installed
  • OR bind-devel-9.6ESVR11W1-0.9.1 is installed
  • OR bind-doc-9.6ESVR11W1-0.9.1 is installed
  • OR bind-libs-9.6ESVR11W1-0.9.1 is installed
  • OR bind-libs-32bit-9.6ESVR11W1-0.9.1 is installed
  • OR bind-utils-9.6ESVR11W1-0.9.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP2 is installed
  • AND Package Information
  • OpenEXR-1.6.1-83.17.1 is installed
  • OR OpenEXR-32bit-1.6.1-83.17.1 is installed
  • OR OpenEXR-x86-1.6.1-83.17.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP3 is installed
  • AND Package Information
  • fetchmail-6.3.8.90-13.20.19.1 is installed
  • OR fetchmailconf-6.3.8.90-13.20.19.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP4 is installed
  • AND automake-1.10.1-4.131.9.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11-SECURITY is installed
  • AND Package Information
  • libldap-openssl1-2_4-2-2.4.26-0.35.1 is installed
  • OR libldap-openssl1-2_4-2-32bit-2.4.26-0.35.1 is installed
  • OR libldap-openssl1-2_4-2-x86-2.4.26-0.35.1 is installed
  • OR openldap2-client-openssl1-2.4.26-0.35.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 is installed
  • AND Package Information
  • bash-4.2-75 is installed
  • OR bash-doc-4.2-75 is installed
  • OR libreadline6-6.2-75 is installed
  • OR libreadline6-32bit-6.2-75 is installed
  • OR readline-doc-6.2-75 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1 is installed
  • AND Package Information
  • augeas-1.2.0-3 is installed
  • OR augeas-lenses-1.2.0-3 is installed
  • OR libaugeas0-1.2.0-3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • bind-9.9.9P1-46 is installed
  • OR bind-chrootenv-9.9.9P1-46 is installed
  • OR bind-doc-9.9.9P1-46 is installed
  • OR bind-libs-9.9.9P1-46 is installed
  • OR bind-libs-32bit-9.9.9P1-46 is installed
  • OR bind-utils-9.9.9P1-46 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • guile-2.0.9-8 is installed
  • OR guile-modules-2_0-2.0.9-8 is installed
  • OR libguile-2_0-22-2.0.9-8 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • DirectFB-1.7.1-6 is installed
  • OR lib++dfb-1_7-1-1.7.1-6 is installed
  • OR libdirectfb-1_7-1-1.7.1-6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP5 is installed
  • AND apache-commons-httpclient-3.1-4 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12-LTSS is installed
  • AND Package Information
  • MozillaFirefox-45.5.0esr-88.1 is installed
  • OR MozillaFirefox-translations-45.5.0esr-88.1 is installed
  • OR libfreebl3-3.21.3-50.1 is installed
  • OR libfreebl3-32bit-3.21.3-50.1 is installed
  • OR libfreebl3-hmac-3.21.3-50.1 is installed
  • OR libfreebl3-hmac-32bit-3.21.3-50.1 is installed
  • OR libsoftokn3-3.21.3-50.1 is installed
  • OR libsoftokn3-32bit-3.21.3-50.1 is installed
  • OR libsoftokn3-hmac-3.21.3-50.1 is installed
  • OR libsoftokn3-hmac-32bit-3.21.3-50.1 is installed
  • OR mozilla-nss-3.21.3-50.1 is installed
  • OR mozilla-nss-32bit-3.21.3-50.1 is installed
  • OR mozilla-nss-certs-3.21.3-50.1 is installed
  • OR mozilla-nss-certs-32bit-3.21.3-50.1 is installed
  • OR mozilla-nss-sysinit-3.21.3-50.1 is installed
  • OR mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed
  • OR mozilla-nss-tools-3.21.3-50.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
  • AND Package Information
  • ghostscript-9.15-17 is installed
  • OR ghostscript-x11-9.15-17 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for SAP Applications 12 is installed
  • AND Package Information
  • kgraft-patch-3_12_60-52_54-default-2-2 is installed
  • OR kgraft-patch-3_12_60-52_54-xen-2-2 is installed
  • OR kgraft-patch-SLE12_Update_15-2-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
  • AND Package Information
  • GraphicsMagick-1.2.5-4.33.1 is installed
  • OR libGraphicsMagick2-1.2.5-4.33.1 is installed
  • OR perl-GraphicsMagick-1.2.5-4.33.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
  • AND a2ps-devel-4.13-1326.37.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
  • AND libwebkit-1_0-1-1.0.1-0.1.141 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 is installed
  • AND Package Information
  • MozillaFirefox-38.7.0esr-63 is installed
  • OR MozillaFirefox-devel-38.7.0esr-63 is installed
  • OR mozilla-nspr-4.12-12 is installed
  • OR mozilla-nspr-devel-4.12-12 is installed
  • OR mozilla-nss-3.20.2-40 is installed
  • OR mozilla-nss-devel-3.20.2-40 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
  • AND Package Information
  • libxerces-c-devel-3.1.1-12 is installed
  • OR xerces-c-3.1.1-12 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
  • AND libXxf86dga-devel-1.1.4-3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
  • AND Package Information
  • FastCGI-2.4.0-168 is installed
  • OR FastCGI-devel-2.4.0-168 is installed
  • OR perl-FastCGI-2.4.0-168 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
  • AND Package Information
  • ant-1.9.4-3.3 is installed
  • OR ant-jmf-1.9.4-3.3 is installed
  • OR ant-scripts-1.9.4-3.3 is installed
  • OR ant-swing-1.9.4-3.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 is installed
  • AND Package Information
  • gnome-online-accounts-3.10.5-1 is installed
  • OR gnome-online-accounts-lang-3.10.5-1 is installed
  • OR typelib-1_0-Goa-1_0-3.10.5-1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
  • AND Package Information
  • ImageMagick-6.8.8.1-8 is installed
  • OR libMagick++-6_Q16-3-6.8.8.1-8 is installed
  • OR libMagickCore-6_Q16-1-32bit-6.8.8.1-8 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
  • AND bogofilter-1.2.4-5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP3 is installed
  • AND Package Information
  • NetworkManager-1.0.12-12 is installed
  • OR NetworkManager-lang-1.0.12-12 is installed
  • OR typelib-1_0-NM-1_0-1.0.12-12 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP4 is installed
  • AND Package Information
  • gegl-0_2-0.2.0-14 is installed
  • OR gegl-0_2-lang-0.2.0-14 is installed
  • OR libgegl-0_2-0-0.2.0-14 is installed
  • BACK