Oval Definition:oval:org.opensuse.security:def:8952
Revision Date:2021-05-18Version:1
Title:Security update for the Linux Kernel (Important)
Description:

The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.



The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509). - CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208). - CVE-2021-29155: Fixed an issue within kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations (bnc#1184942). - CVE-2020-36310: Fixed an issue in arch/x86/kvm/svm/svm.c that allowed a set_memory_region_test infinite loop for certain nested page faults (bnc#1184512). - CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583). - CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391). - CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181). - CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181). - CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181). - CVE-2020-36311: Fixed an issue in arch/x86/kvm/svm/sev.c that allowed attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions) (bnc#1184511). - CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211). - CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211). - CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120). - CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393). - CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397). - CVE-2021-28964: Fixed a race condition in fs/btrfs/ctree.c that could have caused a denial of service because of a lack of locking on an extent buffer before a cloning operation (bnc#1184193). - CVE-2021-3444: Fixed the bpf verifier as it did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution (bnc#1184170). - CVE-2021-28971: Fixed a potential local denial of service in intel_pmu_drain_pebs_nhm where userspace applications can cause a system crash because the PEBS status in a PEBS record is mishandled (bnc#1184196). - CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646). - CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167). - CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168). - CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198). - CVE-2021-29647: Fixed an issue in kernel qrtr_recvmsg in net/qrtr/qrtr.c that allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bnc#1184192). - CVE-2020-27171: Fixed an issue in kernel/bpf/verifier.c that had an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bnc#1183686, bnc#1183775). - CVE-2020-27170: Fixed an issue in kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. This affects pointer types that do not define a ptr_limit (bnc#1183686 bnc#1183775). - CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593). - CVE-2020-35519: Update patch reference for x25 fix (bsc#1183696). - CVE-2021-3428: Fixed ext4 integer overflow in ext4_es_cache_extent (bsc#1173485, bsc#1183509). - CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720). - CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069). - CVE-2020-27815: Fixed jfs array index bounds check in dbAdjTree (bsc#1179454). - CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715). - CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716). - CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).

The following non-security bugs were fixed:

- Revert 'rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)' This turned out to be a bad idea: the kernel-$flavor-devel package must be usable without kernel-$flavor, e.g. at the build of a KMP. And this change brought superfluous installation of kernel-preempt when a system had kernel-syms (bsc#1185113). - Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). - bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455). - bfq: update internal depth state when queue depth changes (bsc#1172455). - bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). - bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775). - handle also the opposite type of race condition - ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997). - ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844). - ibmvnic: store valid MAC address (bsc#1182011). - macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). - nvme: return an error if nvme_set_queue_count() fails (bsc#1180197). - post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388). - rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063). - rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244) - rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650) - xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022, XSA-367).
Family:unixClass:patch
Status:Reference(s):1047233
1172455
1173485
1176720
1177411
1178181
1179454
1180197
1181960
1182011
1182672
1182715
1182716
1182717
1183022
1183063
1183069
1183509
1183593
1183646
1183686
1183696
1183775
1184120
1184167
1184168
1184170
1184192
1184193
1184194
1184196
1184198
1184208
1184211
1184388
1184391
1184393
1184397
1184509
1184511
1184512
1184514
1184583
1184650
1184942
1185113
1185244
CVE-2007-4772
CVE-2007-6600
CVE-2009-0163
CVE-2009-1273
CVE-2009-2624
CVE-2009-2625
CVE-2009-2820
CVE-2009-3553
CVE-2009-3560
CVE-2009-3627
CVE-2009-3720
CVE-2009-4034
CVE-2009-4136
CVE-2010-0001
CVE-2010-0393
CVE-2010-0540
CVE-2010-0542
CVE-2010-1169
CVE-2010-1170
CVE-2010-1205
CVE-2010-1748
CVE-2010-2242
CVE-2010-2941
CVE-2010-3433
CVE-2011-1146
CVE-2011-2186
CVE-2011-2501
CVE-2011-2511
CVE-2011-2690
CVE-2011-2691
CVE-2011-2692
CVE-2011-3026
CVE-2011-3048
CVE-2011-3328
CVE-2011-3464
CVE-2011-4600
CVE-2012-0866
CVE-2012-0867
CVE-2012-0868
CVE-2012-0876
CVE-2012-1147
CVE-2012-1148
CVE-2012-2143
CVE-2012-2655
CVE-2012-3386
CVE-2012-3445
CVE-2012-3488
CVE-2012-3489
CVE-2012-5519
CVE-2012-6094
CVE-2012-6702
CVE-2013-0170
CVE-2013-0255
CVE-2013-1899
CVE-2013-1900
CVE-2013-1901
CVE-2013-1962
CVE-2013-2218
CVE-2013-2230
CVE-2013-4153
CVE-2013-4154
CVE-2013-4239
CVE-2013-4296
CVE-2013-4297
CVE-2013-4311
CVE-2013-4399
CVE-2013-4400
CVE-2013-4401
CVE-2013-6436
CVE-2013-6457
CVE-2013-6458
CVE-2014-0028
CVE-2014-0060
CVE-2014-0061
CVE-2014-0062
CVE-2014-0063
CVE-2014-0064
CVE-2014-0065
CVE-2014-0066
CVE-2014-0067
CVE-2014-0179
CVE-2014-0467
CVE-2014-1447
CVE-2014-2856
CVE-2014-3467
CVE-2014-3468
CVE-2014-3469
CVE-2014-3537
CVE-2014-3633
CVE-2014-3657
CVE-2014-4038
CVE-2014-4039
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
CVE-2014-7823
CVE-2014-8136
CVE-2014-9116
CVE-2014-9390
CVE-2014-9679
CVE-2015-0236
CVE-2015-0247
CVE-2015-0840
CVE-2015-1158
CVE-2015-1159
CVE-2015-1283
CVE-2015-1572
CVE-2015-2806
CVE-2015-3165
CVE-2015-3166
CVE-2015-3167
CVE-2015-3622
CVE-2015-5247
CVE-2015-5288
CVE-2015-5289
CVE-2015-5313
CVE-2015-8126
CVE-2016-0718
CVE-2016-0766
CVE-2016-0773
CVE-2016-2315
CVE-2016-2324
CVE-2016-4008
CVE-2016-5300
CVE-2016-5423
CVE-2016-5424
CVE-2016-9063
CVE-2017-15108
CVE-2017-18190
CVE-2017-18248
CVE-2017-9233
CVE-2018-14349
CVE-2018-14350
CVE-2018-14351
CVE-2018-14352
CVE-2018-14353
CVE-2018-14354
CVE-2018-14355
CVE-2018-14356
CVE-2018-14357
CVE-2018-14358
CVE-2018-14359
CVE-2018-14360
CVE-2018-14361
CVE-2018-14362
CVE-2018-14363
CVE-2018-4180
CVE-2018-4181
CVE-2018-4182
CVE-2018-4183
CVE-2020-0433
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
CVE-2020-27170
CVE-2020-27171
CVE-2020-27673
CVE-2020-27815
CVE-2020-35519
CVE-2020-36310
CVE-2020-36311
CVE-2020-36312
CVE-2020-36322
CVE-2021-20219
CVE-2021-27363
CVE-2021-27364
CVE-2021-27365
CVE-2021-28038
CVE-2021-28660
CVE-2021-28688
CVE-2021-28950
CVE-2021-28964
CVE-2021-28971
CVE-2021-28972
CVE-2021-29154
CVE-2021-29155
CVE-2021-29264
CVE-2021-29265
CVE-2021-29647
CVE-2021-29650
CVE-2021-30002
CVE-2021-3428
CVE-2021-3444
CVE-2021-3483
SUSE-SU-2021:1624-1
Platform(s):openSUSE 13.2
openSUSE 13.2 NonFree
openSUSE Leap 42.1
SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Desktop 12 SP4
SUSE Linux Enterprise High Availability 12 SP1
SUSE Linux Enterprise High Availability 12 SP2
SUSE Linux Enterprise High Availability 12 SP3
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Live Patching 12 SP3
SUSE Linux Enterprise Module for Containers 12
SUSE Linux Enterprise Real Time Extension 12 SP2
SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 11 SP1-LTSS
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP2-LTSS
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP1-LTSS
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12 SP1
SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12-LTSS
SUSE Linux Enterprise Server for VMWare 11 SP2
SUSE Linux Enterprise Server for VMWare 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP4
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Software Development Kit 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP4
SUSE Linux Enterprise Software Development Kit 12 SP5
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Workstation Extension 12 SP1
SUSE Linux Enterprise Workstation Extension 12 SP2
SUSE Linux Enterprise Workstation Extension 12 SP3
SUSE Package Hub for SUSE Linux Enterprise 12
SUSE Package Hub for SUSE Linux Enterprise 12 SP1
Product(s):
Definition Synopsis
  • SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 is installed
  • AND python-setuptools-1.1.7-7.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP3 is installed
  • AND Package Information
  • libblkid1-2.19.1-6.62.1 is installed
  • OR libblkid1-32bit-2.19.1-6.62.1 is installed
  • OR libuuid-devel-2.19.1-6.62.1 is installed
  • OR libuuid1-2.19.1-6.62.1 is installed
  • OR libuuid1-32bit-2.19.1-6.62.1 is installed
  • OR util-linux-2.19.1-6.62.1 is installed
  • OR util-linux-lang-2.19.1-6.62.1 is installed
  • OR uuid-runtime-2.19.1-6.62.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP3 is installed
  • AND Package Information
  • icu-52.1-8.3 is installed
  • OR libicu52_1-52.1-8.3 is installed
  • OR libicu52_1-32bit-52.1-8.3 is installed
  • OR libicu52_1-data-52.1-8.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP4 is installed
  • AND Package Information
  • libgcrypt-1.6.1-16.62 is installed
  • OR libgcrypt20-1.6.1-16.62 is installed
  • OR libgcrypt20-32bit-1.6.1-16.62 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability 12 SP1 is installed
  • AND Package Information
  • ctdb-4.2.4-26 is installed
  • OR samba-4.2.4-26 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability 12 SP2 is installed
  • AND Package Information
  • libpcreposix0-8.39-7 is installed
  • OR pcre-8.39-7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Availability 12 SP3 is installed
  • AND Package Information
  • ctdb-4.6.7+git.38.90b2cdb4f22-3.7 is installed
  • OR ldirectord-4.0.1+git.1495055229.643177f1-2.4 is installed
  • OR monitoring-plugins-metadata-4.0.1+git.1495055229.643177f1-2.4 is installed
  • OR resource-agents-4.0.1+git.1495055229.643177f1-2.4 is installed
  • OR samba-4.6.7+git.38.90b2cdb4f22-3.7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS is installed
  • AND Package Information
  • kernel-default-4.12.14-197.89.2 is installed
  • OR kernel-default-base-4.12.14-197.89.2 is installed
  • OR kernel-default-devel-4.12.14-197.89.2 is installed
  • OR kernel-devel-4.12.14-197.89.2 is installed
  • OR kernel-docs-4.12.14-197.89.3 is installed
  • OR kernel-macros-4.12.14-197.89.2 is installed
  • OR kernel-obs-build-4.12.14-197.89.2 is installed
  • OR kernel-source-4.12.14-197.89.2 is installed
  • OR kernel-syms-4.12.14-197.89.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Live Patching 12 is installed
  • AND Package Information
  • kgraft-patch-3_12_36-38-default-4-2 is installed
  • OR kgraft-patch-3_12_36-38-xen-4-2 is installed
  • OR kgraft-patch-SLE12_Update_2-4-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Live Patching 12 SP3 is installed
  • AND Package Information
  • kgraft-patch-4_4_82-6_6-default-3-2 is installed
  • OR kgraft-patch-SLE12-SP3_Update_2-3-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Containers 12 is installed
  • AND Package Information
  • ruby2.1-rubygem-rack-1_4-1.4.5-8.10 is installed
  • OR rubygem-rack-1_4-1.4.5-8.10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Real Time Extension 12 SP2 is installed
  • AND Package Information
  • cluster-md-kmp-rt-4.4.104-24 is installed
  • OR cluster-network-kmp-rt-4.4.104-24 is installed
  • OR dlm-kmp-rt-4.4.104-24 is installed
  • OR gfs2-kmp-rt-4.4.104-24 is installed
  • OR kernel-devel-rt-4.4.104-24 is installed
  • OR kernel-rt-4.4.104-24 is installed
  • OR kernel-rt-base-4.4.104-24 is installed
  • OR kernel-rt-devel-4.4.104-24 is installed
  • OR kernel-rt_debug-4.4.104-24 is installed
  • OR kernel-rt_debug-devel-4.4.104-24 is installed
  • OR kernel-source-rt-4.4.104-24 is installed
  • OR kernel-syms-rt-4.4.104-24 is installed
  • OR ocfs2-kmp-rt-4.4.104-24 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 is installed
  • AND Package Information
  • dbus-1-1.2.10-3.9.1 is installed
  • OR dbus-1-32bit-1.2.10-3.9.1 is installed
  • OR dbus-1-x86-1.2.10-3.9.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP1 is installed
  • AND Package Information
  • gnutls-2.4.1-24.19.1 is installed
  • OR libgnutls26-2.4.1-24.19.1 is installed
  • OR libgnutls26-32bit-2.4.1-24.19.1 is installed
  • OR libgnutls26-x86-2.4.1-24.19.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP1-LTSS is installed
  • AND Package Information
  • MozillaFirefox-24.5.0esr-0.3.1 is installed
  • OR MozillaFirefox-branding-SLED-24-0.4.10.14 is installed
  • OR MozillaFirefox-translations-24.5.0esr-0.3.1 is installed
  • OR libfreebl3-3.16-0.3.1 is installed
  • OR libfreebl3-32bit-3.16-0.3.1 is installed
  • OR mozilla-nspr-4.10.4-0.3.1 is installed
  • OR mozilla-nspr-32bit-4.10.4-0.3.1 is installed
  • OR mozilla-nss-3.16-0.3.1 is installed
  • OR mozilla-nss-32bit-3.16-0.3.1 is installed
  • OR mozilla-nss-tools-3.16-0.3.1 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 11 SP2 is installed
  • AND
  • libgcrypt11-1.5.0-0.15.2 is installed
  • OR libgcrypt11-32bit-1.5.0-0.15.2 is installed
  • OR libgcrypt11-x86-1.5.0-0.15.2 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for VMWare 11 SP2 is installed
  • AND
  • libgcrypt11-1.5.0-0.15.2 is installed
  • OR libgcrypt11-32bit-1.5.0-0.15.2 is installed
  • OR libgcrypt11-x86-1.5.0-0.15.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP2 is installed
  • AND clamav-0.97.3-0.2.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP2-LTSS is installed
  • AND kvm-0.15.1-0.32.2 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 11 SP3 is installed
  • AND
  • MozillaFirefox-24.6.0esr-0.8.1 is installed
  • OR MozillaFirefox-branding-SLED-24-0.7.48 is installed
  • OR MozillaFirefox-translations-24.6.0esr-0.8.1 is installed
  • OR libfreebl3-3.16.1-0.8.1 is installed
  • OR libfreebl3-32bit-3.16.1-0.8.1 is installed
  • OR libfreebl3-x86-3.16.1-0.8.1 is installed
  • OR libsoftokn3-3.16.1-0.8.1 is installed
  • OR libsoftokn3-32bit-3.16.1-0.8.1 is installed
  • OR libsoftokn3-x86-3.16.1-0.8.1 is installed
  • OR mozilla-nspr-4.10.6-0.3.1 is installed
  • OR mozilla-nspr-32bit-4.10.6-0.3.1 is installed
  • OR mozilla-nspr-x86-4.10.6-0.3.1 is installed
  • OR mozilla-nss-3.16.1-0.8.1 is installed
  • OR mozilla-nss-32bit-3.16.1-0.8.1 is installed
  • OR mozilla-nss-tools-3.16.1-0.8.1 is installed
  • OR mozilla-nss-x86-3.16.1-0.8.1 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for VMWare 11 SP3 is installed
  • AND
  • MozillaFirefox-24.6.0esr-0.8.1 is installed
  • OR MozillaFirefox-branding-SLED-24-0.7.48 is installed
  • OR MozillaFirefox-translations-24.6.0esr-0.8.1 is installed
  • OR libfreebl3-3.16.1-0.8.1 is installed
  • OR libfreebl3-32bit-3.16.1-0.8.1 is installed
  • OR libfreebl3-x86-3.16.1-0.8.1 is installed
  • OR libsoftokn3-3.16.1-0.8.1 is installed
  • OR libsoftokn3-32bit-3.16.1-0.8.1 is installed
  • OR libsoftokn3-x86-3.16.1-0.8.1 is installed
  • OR mozilla-nspr-4.10.6-0.3.1 is installed
  • OR mozilla-nspr-32bit-4.10.6-0.3.1 is installed
  • OR mozilla-nspr-x86-4.10.6-0.3.1 is installed
  • OR mozilla-nss-3.16.1-0.8.1 is installed
  • OR mozilla-nss-32bit-3.16.1-0.8.1 is installed
  • OR mozilla-nss-tools-3.16.1-0.8.1 is installed
  • OR mozilla-nss-x86-3.16.1-0.8.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP3 is installed
  • AND Package Information
  • NetworkManager-0.7.1_git20090811-3.28.2 is installed
  • OR NetworkManager-glib-0.7.1_git20090811-3.28.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP3-LTSS is installed
  • AND Package Information
  • ImageMagick-6.4.3.6-7.34.1 is installed
  • OR libMagickCore1-6.4.3.6-7.34.1 is installed
  • OR libMagickCore1-32bit-6.4.3.6-7.34.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 11 SP4 is installed
  • AND Package Information
  • NetworkManager-0.7.1_git20090811-3.28.2 is installed
  • OR NetworkManager-glib-0.7.1_git20090811-3.28.2 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12 is installed
  • AND
  • cpio-2.11-29 is installed
  • OR cpio-lang-2.11-29 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for SAP Applications 12 is installed
  • AND
  • cpio-2.11-29 is installed
  • OR cpio-lang-2.11-29 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 is installed
  • AND Package Information
  • bind-9.9.6P1-28.12.1 is installed
  • OR bind-chrootenv-9.9.6P1-28.12.1 is installed
  • OR bind-doc-9.9.6P1-28.12.1 is installed
  • OR bind-libs-9.9.6P1-28.12.1 is installed
  • OR bind-libs-32bit-9.9.6P1-28.12.1 is installed
  • OR bind-utils-9.9.6P1-28.12.1 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12 SP1 is installed
  • AND
  • perl-5.18.2-11 is installed
  • OR perl-32bit-5.18.2-11 is installed
  • OR perl-base-5.18.2-11 is installed
  • OR perl-doc-5.18.2-11 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 is installed
  • AND
  • perl-5.18.2-11 is installed
  • OR perl-32bit-5.18.2-11 is installed
  • OR perl-base-5.18.2-11 is installed
  • OR perl-doc-5.18.2-11 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1 is installed
  • AND Package Information
  • bind-9.9.9P1-46 is installed
  • OR bind-chrootenv-9.9.9P1-46 is installed
  • OR bind-doc-9.9.9P1-46 is installed
  • OR bind-libs-9.9.9P1-46 is installed
  • OR bind-libs-32bit-9.9.9P1-46 is installed
  • OR bind-utils-9.9.9P1-46 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12 SP1-LTSS is installed
  • AND
  • evince-3.10.3-2.3 is installed
  • OR evince-lang-3.10.3-2.3 is installed
  • OR libevdocument3-4-3.10.3-2.3 is installed
  • OR libevview3-3-3.10.3-2.3 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS is installed
  • AND
  • evince-3.10.3-2.3 is installed
  • OR evince-lang-3.10.3-2.3 is installed
  • OR libevdocument3-4-3.10.3-2.3 is installed
  • OR libevview3-3-3.10.3-2.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • libXcursor-1.1.14-4.3 is installed
  • OR libXcursor1-1.1.14-4.3 is installed
  • OR libXcursor1-32bit-1.1.14-4.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_103-92_56-default-4-2.2 is installed
  • OR kgraft-patch-SLE12-SP2_Update_17-4-2.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • libzip-0.11.1-13.3.1 is installed
  • OR libzip2-0.11.1-13.3.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • cups-1.7.5-20.17 is installed
  • OR cups-client-1.7.5-20.17 is installed
  • OR cups-libs-1.7.5-20.17 is installed
  • OR cups-libs-32bit-1.7.5-20.17 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP5 is installed
  • AND mutt-1.10.1-55.6 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12-LTSS is installed
  • AND
  • libmysqlclient-devel-10.0.27-20.13 is installed
  • OR libmysqlclient18-10.0.27-20.13 is installed
  • OR libmysqlclient18-32bit-10.0.27-20.13 is installed
  • OR libmysqlclient_r18-10.0.27-20.13 is installed
  • OR libmysqld-devel-10.0.27-20.13 is installed
  • OR libmysqld18-10.0.27-20.13 is installed
  • OR mariadb-10.0.27-20.13 is installed
  • OR mariadb-client-10.0.27-20.13 is installed
  • OR mariadb-errormessages-10.0.27-20.13 is installed
  • OR mariadb-tools-10.0.27-20.13 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for SAP Applications 12-LTSS is installed
  • AND
  • libmysqlclient-devel-10.0.27-20.13 is installed
  • OR libmysqlclient18-10.0.27-20.13 is installed
  • OR libmysqlclient18-32bit-10.0.27-20.13 is installed
  • OR libmysqlclient_r18-10.0.27-20.13 is installed
  • OR libmysqld-devel-10.0.27-20.13 is installed
  • OR libmysqld18-10.0.27-20.13 is installed
  • OR mariadb-10.0.27-20.13 is installed
  • OR mariadb-client-10.0.27-20.13 is installed
  • OR mariadb-errormessages-10.0.27-20.13 is installed
  • OR mariadb-tools-10.0.27-20.13 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 is installed
  • AND Package Information
  • e2fsprogs-1.42.11-7 is installed
  • OR libcom_err2-1.42.11-7 is installed
  • OR libext2fs2-1.42.11-7 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for SAP Applications 12 is installed
  • AND Package Information
  • kgraft-patch-3_12_48-52_27-default-5-2 is installed
  • OR kgraft-patch-3_12_48-52_27-xen-5-2 is installed
  • OR kgraft-patch-SLE12_Update_8-5-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 is installed
  • AND Package Information
  • kgraft-patch-3_12_67-60_64_18-default-8-3 is installed
  • OR kgraft-patch-3_12_67-60_64_18-xen-8-3 is installed
  • OR kgraft-patch-SLE12-SP1_Update_9-8-3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2 is installed
  • AND Package Information
  • compat-openssl098-0.9.8j-105 is installed
  • OR libopenssl0_9_8-0.9.8j-105 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP2 is installed
  • AND Package Information
  • freetype2-devel-2.3.7-25.32.1 is installed
  • OR freetype2-devel-32bit-2.3.7-25.32.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP3 is installed
  • AND Package Information
  • ImageMagick-6.4.3.6-7.30.1 is installed
  • OR ImageMagick-devel-6.4.3.6-7.30.1 is installed
  • OR libMagick++-devel-6.4.3.6-7.30.1 is installed
  • OR libMagick++1-6.4.3.6-7.30.1 is installed
  • OR libMagickWand1-6.4.3.6-7.30.1 is installed
  • OR libMagickWand1-32bit-6.4.3.6-7.30.1 is installed
  • OR perl-PerlMagick-6.4.3.6-7.30.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 11 SP4 is installed
  • AND NetworkManager-devel-0.7.1_git20090811-3.28.2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 is installed
  • AND bind-devel-9.9.5P1-1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP1 is installed
  • AND bind-devel-9.9.6P1-30 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP2 is installed
  • AND augeas-devel-1.2.0-10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP3 is installed
  • AND aaa_base-malloccheck-13.2+git20140911.61c1681-36 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP4 is installed
  • AND aaa_base-malloccheck-13.2+git20140911.61c1681-38.8 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Software Development Kit 12 SP5 is installed
  • AND alsa-devel-1.0.27.2-15 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 is installed
  • AND gnome-shell-calendar-3.10.4-22 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP1 is installed
  • AND gnome-shell-calendar-3.10.4-40 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP2 is installed
  • AND Package Information
  • lhasa-0.2.0-5 is installed
  • OR liblhasa0-0.2.0-5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 12 SP3 is installed
  • AND Package Information
  • colord-1.3.3-12 is installed
  • OR colord-lang-1.3.3-12 is installed
  • Definition Synopsis
  • SUSE Package Hub for SUSE Linux Enterprise 12 is installed
  • AND Package Information
  • chromedriver-52.0.2743.82-89.1 is installed
  • OR chromium-52.0.2743.82-89.1 is installed
  • OR chromium-desktop-gnome-52.0.2743.82-89.1 is installed
  • OR chromium-desktop-kde-52.0.2743.82-89.1 is installed
  • OR chromium-ffmpegsumo-52.0.2743.82-89.1 is installed
  • Definition Synopsis
  • SUSE Package Hub for SUSE Linux Enterprise 12 SP1 is installed
  • AND Package Information
  • kcoreaddons-5.20.0-6.1 is installed
  • OR kcoreaddons-devel-5.20.0-6.1 is installed
  • OR kcoreaddons-devel-32bit-5.21.0-18.1 is installed
  • OR kcoreaddons-lang-5.20.0-6.1 is installed
  • OR libKF5CoreAddons5-5.20.0-6.1 is installed
  • OR libKF5CoreAddons5-32bit-5.21.0-18.1 is installed
  • BACK