Revision Date: | 2021-06-09 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484). - CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111) - CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062) - CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060) - CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675) - CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642). - CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611). - CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859). - CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862). - CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859). - CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860) - CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
The following non-security bugs were fixed:
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725). - Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725). - dm: fix redundant IO accounting for bios that need splitting (bsc#1183738). - ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043). - ibmvfc: Handle move login failure (bsc#1185938 ltc#192043). - ibmvfc: Reinit target retries (bsc#1185938 ltc#192043). - kabi: Fix breakage in NVMe driver (bsc#1181161). - kabi: Fix nvmet error log definitions (bsc#1181161). - kabi: nvme: fix fast_io_fail_tmo (bsc#1181161). - md/raid1: properly indicate failure when ending a failed write request (bsc#1185680). - net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405) - netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950). - netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950). - netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950). - netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950). - nvme-fabrics: allow to queue requests for live queues (bsc#1181161). - nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1181161). - nvme-fabrics: reject I/O to offline device (bsc#1181161). - nvme-pci: Sync queues on reset (bsc#1181161). - nvme-rdma: avoid race between time out and tear down (bsc#1181161). - nvme-rdma: avoid repeated request completion (bsc#1181161). - nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161). - nvme-rdma: fix controller reset hang during traffic (bsc#1181161). - nvme-rdma: fix possible hang when failing to set io queues (bsc#1181161). - nvme-rdma: fix timeout handler (bsc#1181161). - nvme-rdma: serialize controller teardown sequences (bsc#1181161). - nvme-tcp: avoid race between time out and tear down (bsc#1181161). - nvme-tcp: avoid repeated request completion (bsc#1181161). - nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161). - nvme-tcp: fix controller reset hang during traffic (bsc#1181161). - nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161). - nvme-tcp: fix timeout handler (bsc#1181161). - nvme-tcp: serialize controller teardown sequences (bsc#1181161). - nvme: Restart request timers in resetting state (bsc#1181161). - nvme: add error log page slot definition (bsc#1181161). - nvme: include admin_q sync with nvme_sync_queues (bsc#1181161). - nvme: introduce 'Command Aborted By host' status code (bsc#1181161). - nvme: introduce nvme_is_fabrics to check fabrics cmd (bsc#1181161). - nvme: introduce nvme_sync_io_queues (bsc#1181161). - nvme: make fabrics command run on a separate request queue (bsc#1181161). - nvme: prevent warning triggered by nvme_stop_keep_alive (bsc#1181161). - nvme: unlink head after removing last namespace (bsc#1181161). - nvmet: add error log support for fabrics-cmd (bsc#1181161). - nvmet: add error-log definitions (bsc#1181161). - video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1181161 1183405 1183738 1183947 1184611 1184675 1185642 1185680 1185725 1185859 1185860 1185862 1185863 1185898 1185899 1185901 1185938 1185950 1185987 1186060 1186061 1186062 1186111 1186285 1186390 1186484 1186498 CVE-2008-5913 CVE-2009-0040 CVE-2009-0652 CVE-2009-0771 CVE-2009-0772 CVE-2009-0773 CVE-2009-0774 CVE-2009-0775 CVE-2009-0776 CVE-2009-0777 CVE-2009-1044 CVE-2009-1169 CVE-2009-1302 CVE-2009-1303 CVE-2009-1304 CVE-2009-1305 CVE-2009-1306 CVE-2009-1307 CVE-2009-1308 CVE-2009-1309 CVE-2009-1310 CVE-2009-1311 CVE-2009-1312 CVE-2009-1313 CVE-2009-1563 CVE-2009-2470 CVE-2009-2654 CVE-2009-3069 CVE-2009-3070 CVE-2009-3071 CVE-2009-3072 CVE-2009-3073 CVE-2009-3074 CVE-2009-3075 CVE-2009-3077 CVE-2009-3078 CVE-2009-3079 CVE-2009-3274 CVE-2009-3370 CVE-2009-3371 CVE-2009-3372 CVE-2009-3373 CVE-2009-3374 CVE-2009-3375 CVE-2009-3376 CVE-2009-3377 CVE-2009-3378 CVE-2009-3379 CVE-2009-3380 CVE-2009-3381 CVE-2009-3383 CVE-2009-3388 CVE-2009-3389 CVE-2009-3555 CVE-2009-3979 CVE-2009-3980 CVE-2009-3982 CVE-2009-3983 CVE-2009-3984 CVE-2009-3985 CVE-2010-0164 CVE-2010-0165 CVE-2010-0166 CVE-2010-0167 CVE-2010-0168 CVE-2010-0169 CVE-2010-0170 CVE-2010-0171 CVE-2010-0172 CVE-2010-0173 CVE-2010-0174 CVE-2010-0176 CVE-2010-0177 CVE-2010-0178 CVE-2010-0181 CVE-2010-0182 CVE-2010-0654 CVE-2010-1028 CVE-2010-1121 CVE-2010-1125 CVE-2010-1163 CVE-2010-1196 CVE-2010-1197 CVE-2010-1198 CVE-2010-1199 CVE-2010-1200 CVE-2010-1201 CVE-2010-1202 CVE-2010-1203 CVE-2010-1205 CVE-2010-1206 CVE-2010-1207 CVE-2010-1208 CVE-2010-1209 CVE-2010-1210 CVE-2010-1211 CVE-2010-1212 CVE-2010-1213 CVE-2010-1214 CVE-2010-1215 CVE-2010-1646 CVE-2010-2751 CVE-2010-2752 CVE-2010-2753 CVE-2010-2754 CVE-2010-2755 CVE-2010-2760 CVE-2010-2762 CVE-2010-2764 CVE-2010-2765 CVE-2010-2766 CVE-2010-2767 CVE-2010-2768 CVE-2010-2769 CVE-2010-3166 CVE-2010-3167 CVE-2010-3168 CVE-2010-3169 CVE-2010-3170 CVE-2010-3173 CVE-2010-3174 CVE-2010-3175 CVE-2010-3176 CVE-2010-3177 CVE-2010-3178 CVE-2010-3179 CVE-2010-3180 CVE-2010-3182 CVE-2010-3183 CVE-2010-3765 CVE-2011-0010 CVE-2011-0068 CVE-2011-0069 CVE-2011-0070 CVE-2011-0079 CVE-2011-0080 CVE-2011-0081 CVE-2011-0084 CVE-2011-0421 CVE-2011-1187 CVE-2011-1202 CVE-2011-2054 CVE-2011-2366 CVE-2011-2367 CVE-2011-2368 CVE-2011-2369 CVE-2011-2370 CVE-2011-2371 CVE-2011-2372 CVE-2011-2373 CVE-2011-2374 CVE-2011-2375 CVE-2011-2377 CVE-2011-2985 CVE-2011-2986 CVE-2011-2988 CVE-2011-2989 CVE-2011-2990 CVE-2011-2991 CVE-2011-2992 CVE-2011-2993 CVE-2011-2995 CVE-2011-2996 CVE-2011-2997 CVE-2011-3000 CVE-2011-3001 CVE-2011-3002 CVE-2011-3003 CVE-2011-3004 CVE-2011-3005 CVE-2011-3026 CVE-2011-3062 CVE-2011-3101 CVE-2011-3232 CVE-2011-3648 CVE-2011-3650 CVE-2011-3651 CVE-2011-3652 CVE-2011-3654 CVE-2011-3655 CVE-2011-3658 CVE-2011-3659 CVE-2011-3660 CVE-2011-3661 CVE-2011-3663 CVE-2012-0441 CVE-2012-0442 CVE-2012-0443 CVE-2012-0444 CVE-2012-0445 CVE-2012-0446 CVE-2012-0447 CVE-2012-0449 CVE-2012-0451 CVE-2012-0452 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0463 CVE-2012-0464 CVE-2012-0467 CVE-2012-0468 CVE-2012-0469 CVE-2012-0470 CVE-2012-0471 CVE-2012-0472 CVE-2012-0473 CVE-2012-0474 CVE-2012-0475 CVE-2012-0477 CVE-2012-0478 CVE-2012-0479 CVE-2012-0759 CVE-2012-1162 CVE-2012-1163 CVE-2012-1937 CVE-2012-1938 CVE-2012-1940 CVE-2012-1941 CVE-2012-1944 CVE-2012-1945 CVE-2012-1946 CVE-2012-1947 CVE-2012-1948 CVE-2012-1949 CVE-2012-1950 CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 CVE-2012-1955 CVE-2012-1956 CVE-2012-1957 CVE-2012-1958 CVE-2012-1959 CVE-2012-1960 CVE-2012-1961 CVE-2012-1962 CVE-2012-1963 CVE-2012-1965 CVE-2012-1966 CVE-2012-1967 CVE-2012-1970 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974 CVE-2012-1975 CVE-2012-1976 CVE-2012-2337 CVE-2012-2738 CVE-2012-3956 CVE-2012-3957 CVE-2012-3958 CVE-2012-3959 CVE-2012-3960 CVE-2012-3961 CVE-2012-3962 CVE-2012-3963 CVE-2012-3964 CVE-2012-3965 CVE-2012-3966 CVE-2012-3967 CVE-2012-3968 CVE-2012-3969 CVE-2012-3970 CVE-2012-3971 CVE-2012-3972 CVE-2012-3973 CVE-2012-3975 CVE-2012-3976 CVE-2012-3978 CVE-2012-3980 CVE-2012-3982 CVE-2012-3983 CVE-2012-3984 CVE-2012-3985 CVE-2012-3986 CVE-2012-3988 CVE-2012-3989 CVE-2012-3990 CVE-2012-3991 CVE-2012-3992 CVE-2012-3993 CVE-2012-3994 CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 CVE-2012-4184 CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 CVE-2012-4201 CVE-2012-4202 CVE-2012-4203 CVE-2012-4204 CVE-2012-4205 CVE-2012-4207 CVE-2012-4208 CVE-2012-4209 CVE-2012-4210 CVE-2012-4212 CVE-2012-4213 CVE-2012-4214 CVE-2012-4215 CVE-2012-4216 CVE-2012-4217 CVE-2012-4218 CVE-2012-4502 CVE-2012-4503 CVE-2012-5829 CVE-2012-5830 CVE-2012-5833 CVE-2012-5835 CVE-2012-5836 CVE-2012-5837 CVE-2012-5838 CVE-2012-5839 CVE-2012-5840 CVE-2012-5841 CVE-2012-5842 CVE-2012-5843 CVE-2013-0743 CVE-2013-0744 CVE-2013-0745 CVE-2013-0746 CVE-2013-0747 CVE-2013-0748 CVE-2013-0749 CVE-2013-0750 CVE-2013-0751 CVE-2013-0752 CVE-2013-0753 CVE-2013-0754 CVE-2013-0755 CVE-2013-0756 CVE-2013-0757 CVE-2013-0758 CVE-2013-0760 CVE-2013-0761 CVE-2013-0762 CVE-2013-0763 CVE-2013-0764 CVE-2013-0765 CVE-2013-0766 CVE-2013-0767 CVE-2013-0768 CVE-2013-0769 CVE-2013-0770 CVE-2013-0771 CVE-2013-0772 CVE-2013-0773 CVE-2013-0774 CVE-2013-0775 CVE-2013-0776 CVE-2013-0777 CVE-2013-0778 CVE-2013-0779 CVE-2013-0780 CVE-2013-0781 CVE-2013-0782 CVE-2013-0783 CVE-2013-0787 CVE-2013-0788 CVE-2013-0789 CVE-2013-0792 CVE-2013-0793 CVE-2013-0794 CVE-2013-0795 CVE-2013-0796 CVE-2013-0800 CVE-2013-0801 CVE-2013-1669 CVE-2013-1670 CVE-2013-1671 CVE-2013-1674 CVE-2013-1675 CVE-2013-1676 CVE-2013-1677 CVE-2013-1678 CVE-2013-1679 CVE-2013-1680 CVE-2013-1681 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1688 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1695 CVE-2013-1696 CVE-2013-1697 CVE-2013-1698 CVE-2013-1699 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1708 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 CVE-2013-1718 CVE-2013-1719 CVE-2013-1720 CVE-2013-1721 CVE-2013-1722 CVE-2013-1723 CVE-2013-1724 CVE-2013-1725 CVE-2013-1728 CVE-2013-1730 CVE-2013-1732 CVE-2013-1735 CVE-2013-1736 CVE-2013-1737 CVE-2013-1738 CVE-2013-1775 CVE-2013-1776 CVE-2013-2001 CVE-2013-5590 CVE-2013-5591 CVE-2013-5592 CVE-2013-5593 CVE-2013-5595 CVE-2013-5596 CVE-2013-5597 CVE-2013-5598 CVE-2013-5599 CVE-2013-5600 CVE-2013-5601 CVE-2013-5602 CVE-2013-5603 CVE-2013-5604 CVE-2013-5609 CVE-2013-5610 CVE-2013-5611 CVE-2013-5612 CVE-2013-5613 CVE-2013-5614 CVE-2013-5615 CVE-2013-5616 CVE-2013-5618 CVE-2013-5619 CVE-2013-6369 CVE-2013-6629 CVE-2013-6630 CVE-2013-6671 CVE-2013-6672 CVE-2013-6673 CVE-2014-0021 CVE-2014-1477 CVE-2014-1478 CVE-2014-1479 CVE-2014-1480 CVE-2014-1481 CVE-2014-1482 CVE-2014-1483 CVE-2014-1484 CVE-2014-1485 CVE-2014-1486 CVE-2014-1487 CVE-2014-1488 CVE-2014-1489 CVE-2014-1490 CVE-2014-1491 CVE-2014-1544 CVE-2014-1547 CVE-2014-1548 CVE-2014-1553 CVE-2014-1554 CVE-2014-1555 CVE-2014-1556 CVE-2014-1557 CVE-2014-1562 CVE-2014-1563 CVE-2014-1564 CVE-2014-1565 CVE-2014-1567 CVE-2014-1574 CVE-2014-1575 CVE-2014-1576 CVE-2014-1577 CVE-2014-1578 CVE-2014-1581 CVE-2014-1583 CVE-2014-1585 CVE-2014-1586 CVE-2014-1587 CVE-2014-1588 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 CVE-2014-1594 CVE-2014-3230 CVE-2014-8634 CVE-2014-8635 CVE-2014-8638 CVE-2014-8639 CVE-2014-8641 CVE-2014-9680 CVE-2015-0797 CVE-2015-0801 CVE-2015-0807 CVE-2015-0813 CVE-2015-0814 CVE-2015-0815 CVE-2015-0816 CVE-2015-0817 CVE-2015-0818 CVE-2015-0822 CVE-2015-0827 CVE-2015-0831 CVE-2015-0835 CVE-2015-0836 CVE-2015-2331 CVE-2015-2708 CVE-2015-2709 CVE-2015-2710 CVE-2015-2713 CVE-2015-2716 CVE-2015-2721 CVE-2015-2722 CVE-2015-2724 CVE-2015-2725 CVE-2015-2726 CVE-2015-2728 CVE-2015-2730 CVE-2015-2733 CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737 CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 CVE-2015-2743 CVE-2015-2924 CVE-2015-4000 CVE-2015-4473 CVE-2015-4474 CVE-2015-4475 CVE-2015-4478 CVE-2015-4479 CVE-2015-4484 CVE-2015-4485 CVE-2015-4486 CVE-2015-4487 CVE-2015-4488 CVE-2015-4489 CVE-2015-4491 CVE-2015-4492 CVE-2015-4495 CVE-2015-4497 CVE-2015-4498 CVE-2015-4500 CVE-2015-4501 CVE-2015-4506 CVE-2015-4509 CVE-2015-4511 CVE-2015-4513 CVE-2015-4517 CVE-2015-4519 CVE-2015-4520 CVE-2015-4521 CVE-2015-4522 CVE-2015-7174 CVE-2015-7175 CVE-2015-7176 CVE-2015-7177 CVE-2015-7180 CVE-2015-7181 CVE-2015-7182 CVE-2015-7183 CVE-2015-7188 CVE-2015-7189 CVE-2015-7193 CVE-2015-7194 CVE-2015-7196 CVE-2015-7197 CVE-2015-7198 CVE-2015-7199 CVE-2015-7200 CVE-2015-7201 CVE-2015-7202 CVE-2015-7205 CVE-2015-7210 CVE-2015-7212 CVE-2015-7213 CVE-2015-7214 CVE-2015-7222 CVE-2016-0764 CVE-2016-10164 CVE-2016-1523 CVE-2016-1567 CVE-2016-1930 CVE-2016-1931 CVE-2016-1935 CVE-2016-1950 CVE-2016-1952 CVE-2016-1953 CVE-2016-1954 CVE-2016-1957 CVE-2016-1958 CVE-2016-1960 CVE-2016-1961 CVE-2016-1962 CVE-2016-1964 CVE-2016-1965 CVE-2016-1966 CVE-2016-1974 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800 CVE-2016-2801 CVE-2016-2802 CVE-2016-2805 CVE-2016-2807 CVE-2016-2808 CVE-2016-2814 CVE-2016-2815 CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2824 CVE-2016-2828 CVE-2016-2830 CVE-2016-2831 CVE-2016-2835 CVE-2016-2836 CVE-2016-2837 CVE-2016-2838 CVE-2016-2839 CVE-2016-5180 CVE-2016-5250 CVE-2016-5252 CVE-2016-5254 CVE-2016-5257 CVE-2016-5258 CVE-2016-5259 CVE-2016-5261 CVE-2016-5262 CVE-2016-5263 CVE-2016-5264 CVE-2016-5265 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 CVE-2016-6318 CVE-2016-6354 CVE-2016-7032 CVE-2016-7076 CVE-2017-1000367 CVE-2017-1000368 CVE-2017-1000381 CVE-2017-14107 CVE-2017-5731 CVE-2017-5732 CVE-2017-5733 CVE-2017-5734 CVE-2017-5735 CVE-2018-0739 CVE-2018-12178 CVE-2018-12180 CVE-2018-12181 CVE-2018-3613 CVE-2018-3630 CVE-2019-0160 CVE-2019-0161 CVE-2019-14287 CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638 CVE-2020-24586 CVE-2020-24587 CVE-2020-26139 CVE-2020-26141 CVE-2020-26145 CVE-2020-26147 CVE-2021-23133 CVE-2021-23134 CVE-2021-32399 CVE-2021-33034 CVE-2021-33200 CVE-2021-3491 SUSE-SU-2021:1912-1
|
Platform(s): | openSUSE 13.2 openSUSE Leap 42.1 SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Desktop 12 SP2 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise Desktop 12 SP4 SUSE Linux Enterprise Desktop 12 SP5 SUSE Linux Enterprise High Availability 12 SP1 SUSE Linux Enterprise High Availability 12 SP2 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Point of Sale 11 SP3 SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT SUSE Linux Enterprise Real Time Extension 12 SP2 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 11 SP1-LTSS SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP2-LTSS SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP3-LTSS SUSE Linux Enterprise Server 11 SP4 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 SUSE Linux Enterprise Server for SAP Applications 12 SUSE Linux Enterprise Server for SAP Applications 12 SP1 SUSE Linux Enterprise Server for SAP Applications 12-LTSS SUSE Linux Enterprise Server for VMWare 11 SP2 SUSE Linux Enterprise Server for VMWare 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP4 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Software Development Kit 12 SP1 SUSE Linux Enterprise Software Development Kit 12 SP2 SUSE Linux Enterprise Software Development Kit 12 SP3 SUSE Linux Enterprise Software Development Kit 12 SP4 SUSE Linux Enterprise Software Development Kit 12 SP5 SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Workstation Extension 12 SP1 SUSE Linux Enterprise Workstation Extension 12 SP2 SUSE Linux Enterprise Workstation Extension 12 SP3
| Product(s): | |
Definition Synopsis |
SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 is installed AND python-PyYAML-3.10-15.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP2 is installed
AND permissions-2013.1.7-0.3.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP4 is installed
AND Package Information
libopenssl0_9_8-0.9.8j-0.89.1 is installed
OR libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed
OR openssl-0.9.8j-0.89.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed
AND Package Information
bind-9.9.9P1-53 is installed
OR bind-libs-9.9.9P1-53 is installed
OR bind-libs-32bit-9.9.9P1-53 is installed
OR bind-utils-9.9.9P1-53 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND Package Information
qemu-2.9.0-6.3 is installed
OR qemu-block-curl-2.9.0-6.3 is installed
OR qemu-ipxe-1.0.0-6.3 is installed
OR qemu-kvm-2.9.0-6.3 is installed
OR qemu-seabios-1.10.2-6.3 is installed
OR qemu-sgabios-8-6.3 is installed
OR qemu-tools-2.9.0-6.3 is installed
OR qemu-vgabios-1.10.2-6.3 is installed
OR qemu-x86-2.9.0-6.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP4 is installed
AND Package Information
libwpd-0.10.2-2.7 is installed
OR libwpd-0_10-10-0.10.2-2.7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP5 is installed
AND Package Information
glib2-2.48.2-12.12 is installed
OR glib2-lang-2.48.2-12.12 is installed
OR glib2-tools-2.48.2-12.12 is installed
OR libgio-2_0-0-2.48.2-12.12 is installed
OR libgio-2_0-0-32bit-2.48.2-12.12 is installed
OR libgio-fam-2.48.2-12.12 is installed
OR libglib-2_0-0-2.48.2-12.12 is installed
OR libglib-2_0-0-32bit-2.48.2-12.12 is installed
OR libgmodule-2_0-0-2.48.2-12.12 is installed
OR libgmodule-2_0-0-32bit-2.48.2-12.12 is installed
OR libgobject-2_0-0-2.48.2-12.12 is installed
OR libgobject-2_0-0-32bit-2.48.2-12.12 is installed
OR libgthread-2_0-0-2.48.2-12.12 is installed
OR libgthread-2_0-0-32bit-2.48.2-12.12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP1 is installed
AND hawk2-1.0.1+git.1456406635.49e230d-12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability 12 SP2 is installed
AND Package Information
ctdb-4.4.2-31 is installed
OR samba-4.4.2-31 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Availability Extension 11 SP3 is installed
AND Package Information
gnutls-2.4.1-24.39.60.1 is installed
OR libgnutls-extra26-2.4.1-24.39.60.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS is installed
AND Package Information
kernel-default-4.12.14-197.92.1 is installed
OR kernel-default-base-4.12.14-197.92.1 is installed
OR kernel-default-devel-4.12.14-197.92.1 is installed
OR kernel-devel-4.12.14-197.92.1 is installed
OR kernel-docs-4.12.14-197.92.1 is installed
OR kernel-macros-4.12.14-197.92.1 is installed
OR kernel-obs-build-4.12.14-197.92.1 is installed
OR kernel-source-4.12.14-197.92.1 is installed
OR kernel-syms-4.12.14-197.92.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Live Patching 12 is installed
AND Package Information
kgraft-patch-3_12_44-52_10-default-1-2 is installed
OR kgraft-patch-3_12_44-52_10-xen-1-2 is installed
OR kgraft-patch-SLE12_Update_6-1-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Point of Sale 11 SP3 is installed
AND Package Information
MozillaFirefox-45.8.0esr-68.1 is installed
OR MozillaFirefox-translations-45.8.0esr-68.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT is installed
AND Package Information
MozillaFirefox-52.8.1esr-109.34 is installed
OR MozillaFirefox-devel-52.8.1esr-109.34 is installed
OR MozillaFirefox-translations-52.8.1esr-109.34 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Real Time Extension 12 SP2 is installed
AND Package Information
cluster-md-kmp-rt-4.4.88-18 is installed
OR cluster-network-kmp-rt-4.4.88-18 is installed
OR dlm-kmp-rt-4.4.88-18 is installed
OR gfs2-kmp-rt-4.4.88-18 is installed
OR kernel-devel-rt-4.4.88-18 is installed
OR kernel-rt-4.4.88-18 is installed
OR kernel-rt-base-4.4.88-18 is installed
OR kernel-rt-devel-4.4.88-18 is installed
OR kernel-rt_debug-4.4.88-18 is installed
OR kernel-rt_debug-devel-4.4.88-18 is installed
OR kernel-source-rt-4.4.88-18 is installed
OR kernel-syms-rt-4.4.88-18 is installed
OR ocfs2-kmp-rt-4.4.88-18 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1 is installed
AND sudo-1.7.6p2-0.2.8.1 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP1-LTSS is installed
AND sudo-1.7.6p2-0.2.8.1 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP2 is installed
AND sudo-1.7.6p2-0.2.8.1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP1 is installed
AND
puppet-2.6.17-0.3.1 is installed
OR puppet-server-2.6.17-0.3.1 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP2 is installed
AND
puppet-2.6.17-0.3.1 is installed
OR puppet-server-2.6.17-0.3.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP1 is installed
AND Package Information
OpenEXR-1.6.1-83.17.1 is installed
OR OpenEXR-32bit-1.6.1-83.17.1 is installed
OR OpenEXR-x86-1.6.1-83.17.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP1-LTSS is installed
AND Package Information
xen-4.0.3_21548_18-29.1 is installed
OR xen-doc-html-4.0.3_21548_18-29.1 is installed
OR xen-doc-pdf-4.0.3_21548_18-29.1 is installed
OR xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed
OR xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed
OR xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed
OR xen-libs-4.0.3_21548_18-29.1 is installed
OR xen-tools-4.0.3_21548_18-29.1 is installed
OR xen-tools-domU-4.0.3_21548_18-29.1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP2 is installed
AND
apache2-2.2.12-1.40.1 is installed
OR apache2-doc-2.2.12-1.40.1 is installed
OR apache2-example-pages-2.2.12-1.40.1 is installed
OR apache2-prefork-2.2.12-1.40.1 is installed
OR apache2-utils-2.2.12-1.40.1 is installed
OR apache2-worker-2.2.12-1.40.1 is installed
OR Package Information
SUSE Linux Enterprise Server 11 SP2-LTSS is installed
AND
apache2-2.2.12-1.40.1 is installed
OR apache2-doc-2.2.12-1.40.1 is installed
OR apache2-example-pages-2.2.12-1.40.1 is installed
OR apache2-prefork-2.2.12-1.40.1 is installed
OR apache2-utils-2.2.12-1.40.1 is installed
OR apache2-worker-2.2.12-1.40.1 is installed
OR Package Information
SUSE Linux Enterprise Server for VMWare 11 SP2 is installed
AND
apache2-2.2.12-1.40.1 is installed
OR apache2-doc-2.2.12-1.40.1 is installed
OR apache2-example-pages-2.2.12-1.40.1 is installed
OR apache2-prefork-2.2.12-1.40.1 is installed
OR apache2-utils-2.2.12-1.40.1 is installed
OR apache2-worker-2.2.12-1.40.1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP2 is installed
AND
cups-1.3.9-8.46.48.1 is installed
OR cups-client-1.3.9-8.46.48.1 is installed
OR cups-libs-1.3.9-8.46.48.1 is installed
OR cups-libs-32bit-1.3.9-8.46.48.1 is installed
OR cups-libs-x86-1.3.9-8.46.48.1 is installed
OR Package Information
SUSE Linux Enterprise Server for VMWare 11 SP2 is installed
AND
cups-1.3.9-8.46.48.1 is installed
OR cups-client-1.3.9-8.46.48.1 is installed
OR cups-libs-1.3.9-8.46.48.1 is installed
OR cups-libs-32bit-1.3.9-8.46.48.1 is installed
OR cups-libs-x86-1.3.9-8.46.48.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP2 is installed
AND Package Information
MozillaFirefox-10.0-0.3.2 is installed
OR MozillaFirefox-translations-10.0-0.3.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP2-LTSS is installed
AND Package Information
MozillaFirefox-24.6.0esr-0.3.1 is installed
OR MozillaFirefox-branding-SLED-24-0.4.10.24 is installed
OR MozillaFirefox-translations-24.6.0esr-0.3.1 is installed
OR libfreebl3-3.16.1-0.3.1 is installed
OR libfreebl3-32bit-3.16.1-0.3.1 is installed
OR mozilla-nspr-4.10.6-0.3.1 is installed
OR mozilla-nspr-32bit-4.10.6-0.3.1 is installed
OR mozilla-nspr-devel-4.10.6-0.3.1 is installed
OR mozilla-nss-3.16.1-0.3.1 is installed
OR mozilla-nss-32bit-3.16.1-0.3.1 is installed
OR mozilla-nss-devel-3.16.1-0.3.1 is installed
OR mozilla-nss-tools-3.16.1-0.3.1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 11 SP3 is installed
AND xinetd-2.3.14-130.133.1 is installed
OR Package Information
SUSE Linux Enterprise Server for VMWare 11 SP3 is installed
AND xinetd-2.3.14-130.133.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3 is installed
AND apache2-mod_perl-2.0.4-40.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP3-LTSS is installed
AND Package Information
ImageMagick-6.4.3.6-7.34.1 is installed
OR libMagickCore1-6.4.3.6-7.34.1 is installed
OR libMagickCore1-32bit-6.4.3.6-7.34.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 11 SP4 is installed
AND coolkey-1.1.0-22.24 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 is installed
AND
dbus-1-1.8.12-6 is installed
OR dbus-1-x11-1.8.12-6 is installed
OR libdbus-1-3-1.8.12-6 is installed
OR libdbus-1-3-32bit-1.8.12-6 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 is installed
AND
dbus-1-1.8.12-6 is installed
OR dbus-1-x11-1.8.12-6 is installed
OR libdbus-1-3-1.8.12-6 is installed
OR libdbus-1-3-32bit-1.8.12-6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 is installed
AND Package Information
java-1_7_1-ibm-1.7.1_sr3.10-14.1 is installed
OR java-1_7_1-ibm-alsa-1.7.1_sr3.10-14.1 is installed
OR java-1_7_1-ibm-jdbc-1.7.1_sr3.10-14.1 is installed
OR java-1_7_1-ibm-plugin-1.7.1_sr3.10-14.1 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP1 is installed
AND
libtiff5-4.0.6-19 is installed
OR libtiff5-32bit-4.0.6-19 is installed
OR tiff-4.0.6-19 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP1 is installed
AND
libtiff5-4.0.6-19 is installed
OR libtiff5-32bit-4.0.6-19 is installed
OR tiff-4.0.6-19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND wget-1.14-7.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND libtcnative-1-0-1.1.34-12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
libsoup-2_4-1-2.54.1-4 is installed
OR libsoup-2_4-1-32bit-2.54.1-4 is installed
OR libsoup-lang-2.54.1-4 is installed
OR typelib-1_0-Soup-2_4-2.54.1-4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP5 is installed
AND Package Information
libSDL-1_2-0-1.2.15-15.11 is installed
OR libSDL-1_2-0-32bit-1.2.15-15.11 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12-LTSS is installed
AND
kgraft-patch-3_12_61-52_92-default-6-2 is installed
OR kgraft-patch-3_12_61-52_92-xen-6-2 is installed
OR kgraft-patch-SLE12_Update_27-6-2 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12-LTSS is installed
AND
kgraft-patch-3_12_61-52_92-default-6-2 is installed
OR kgraft-patch-3_12_61-52_92-xen-6-2 is installed
OR kgraft-patch-SLE12_Update_27-6-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12-LTSS is installed
AND Package Information
kgraft-patch-3_12_60-52_57-default-6-2 is installed
OR kgraft-patch-3_12_60-52_57-xen-6-2 is installed
OR kgraft-patch-SLE12_Update_16-6-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
AND Package Information
MozillaFirefox-45.4.0esr-81 is installed
OR MozillaFirefox-translations-45.4.0esr-81 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 12 is installed
AND Package Information
kgraft-patch-3_12_51-52_39-default-4-2 is installed
OR kgraft-patch-3_12_51-52_39-xen-4-2 is installed
OR kgraft-patch-SLE12_Update_11-4-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 12 SP1 is installed
AND sudo-1.8.10p3-2.16 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
AND Package Information
ImageMagick-6.4.3.6-7.26.1 is installed
OR ImageMagick-devel-6.4.3.6-7.26.1 is installed
OR libMagick++-devel-6.4.3.6-7.26.1 is installed
OR libMagick++1-6.4.3.6-7.26.1 is installed
OR libMagickWand1-6.4.3.6-7.26.1 is installed
OR libMagickWand1-32bit-6.4.3.6-7.26.1 is installed
OR perl-PerlMagick-6.4.3.6-7.26.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
AND Package Information
apache2-2.2.12-59.1 is installed
OR apache2-devel-2.2.12-59.1 is installed
OR apache2-doc-2.2.12-59.1 is installed
OR apache2-example-pages-2.2.12-59.1 is installed
OR apache2-prefork-2.2.12-59.1 is installed
OR apache2-utils-2.2.12-59.1 is installed
OR apache2-worker-2.2.12-59.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
AND dbus-1-glib-devel-0.76-34.22.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 is installed
AND augeas-devel-1.2.0-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
AND accountsservice-devel-0.6.35-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
AND Package Information
finch-devel-2.11.0-12 is installed
OR libpurple-2.11.0-12 is installed
OR libpurple-devel-2.11.0-12 is installed
OR libpurple-lang-2.11.0-12 is installed
OR pidgin-devel-2.11.0-12 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
AND libXfixes-devel-5.0.1-7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
AND bind-devel-9.11.2-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Software Development Kit 12 SP5 is installed
AND MozillaFirefox-devel-68.1.0-109.92 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 is installed
AND Package Information
dia-0.97.2-13 is installed
OR dia-lang-0.97.2-13 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
AND Package Information
kernel-default-3.12.51-60.20.2 is installed
OR kernel-default-extra-3.12.51-60.20.2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
AND Package Information
ImageMagick-6.8.8.1-54.1 is installed
OR libMagick++-6_Q16-3-6.8.8.1-54.1 is installed
OR libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 12 SP3 is installed
AND Package Information
gcc48-gij-4.8.5-31.3.1 is installed
OR gcc48-gij-32bit-4.8.5-31.3.1 is installed
OR libgcj48-4.8.5-31.3.1 is installed
OR libgcj48-32bit-4.8.5-31.3.1 is installed
OR libgcj48-jar-4.8.5-31.3.1 is installed
OR libgcj_bc1-4.8.5-31.3.1 is installed
|