Security Update CVE installed only for several modules only
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I need to know why all CVEs are not applied in both Modules.[COLOR="Red"]Why is it? I am not aware whether both modules are being used. How can I identify it?
How can you identify what, exactly?? As said, you're grep'ing for different things that what you posted. And did you not read what you posted??? The SDK packages have been applied...the server packages have NOT. You're looking for different CVE's, so why are you surprised that you get different packages??
Hi All,
My appologies using the wrong cve behind the pipe. I have attached the correct script and the output in my previous response.I see that only SDK package was applied with SU. Why the other module was not applied?
Doesn't SUSE-SLE indicate the Enterprise - aka paid-for-andcomes-with-support version? If so, use the support you're paying for.
If not...
Quote:
Originally Posted by https://www.suse.com/support/update/announcement/2021/suse-su-20213332-1/
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-3332=1
SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-3332=1
Its true that the second command (zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-3332=1) will do the necessary Patch installation .
What I am trying to understand is , why only one package was patched and the other was not?
Sorry If I am taking around the ball....I need to clarify that is y I am asking.
Well thanks for all replies...
Its true that the second command (zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-3332=1) will do the necessary Patch installation. What I am trying to understand is, why only one package was patched and the other was not?
Sorry If I am taking around the ball....I need to clarify that is y I am asking.
Then as boughtonp said, contacting the SuSE support that you're paying for would get you an answer pretty quick. Since we don't know what version of SuSE Enterprise you're using, what you've done before this to update/patch/build your system, or any relevant details, there isn't a lot we can tell you. Could be as simple as your system having the two installed packages listed as dependencies for something else, and the two server patches were NOT...so they weren't installed. Doing a "zypper dup" gets different results than what you're doing (sometimes).
Thanks all for your amazing responses, which were truly fruitful. Its true that you have limited information on my environment. Sure, I will try to reach the support guys as I have that option.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.