Known vulnerabilities in SUSE SUSE Linux Enterprise Server 12 SP2-LTSS-ERICSSON

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › SUSE › SUSE Linux Enterprise Server › 12 SP2-LTSS-ERICSSON

Known vulnerabilities in SUSE SUSE Linux Enterprise Server 12 SP2-LTSS-ERICSSON

Vendor: SUSE
Website: https://www.suse.com/
Total Security Bulletins: 7
16.0 11-SP4-LTSS-EXTREME-CORE 15-SP3-LTSS 15-SP3-BCL 11-SP3-CLIENT-TOOLS-BETA 11-SP4-CLIENT-TOOLS-BETA 11-EXTRA 11-SECURITY 12-SP2-LTSS-ERICSSON 12-SP2-LTSS-SAP 12-SP2-LTSS 11-SP3-CLIENT-TOOLS 11-SP4-CLIENT-TOOLS 15-SP2 15-SP1 12-SP3 12-SP4 15-SP2-LTSS 15-SP2-BCL 15-SP3 15-SP4 15-LTSS 15-SP1-BCL 15-SP1-LTSS 12-SP5 12-SP4-LTSS 12-SP3-LTSS 12-SP3-BCL 12-SP2-BCL 11-SP4-LTSS 12 SP2-LTSS-ERICSSON 12 SP2-LTSS-SAP 15 SP3 15 SP2 15 SP1 15 12 SP5 12 SP4 12 SP3 12 SP2 12 SP1 12 11 SP4 11 SP3 11 SP2 11 SP1 11

Security bulletins (7)

Secuity bulletin Severity Status Published
SB2022062436: SUSE update for python3 High
Patched
24.06.2022
SB2022062435: SUSE update for containerd Medium
Patched
24.06.2022
SB2022062432: SUSE update for php74 High
Patched
24.06.2022
SB2022062428: SUSE update for salt Low
Patched
24.06.2022
SB2022062025: SUSE update for python-Twisted Medium
Patched
20.06.2022
SB2021041225: SUSE Linux Enterprise Server update for kernel Medium
Patched
12.04.2021
SB2021041224: SUSE Linux Enterprise Server update for kernel Low
Patched
12.04.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or