SLES-12-010010 - Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep SUSE operating system and application software patched is a common mistake made by IT professionals. New patches are released frequently, and it is often difficult for even experienced System Administrators (SAs) to keep abreast of all the new patches. When new weaknesses in a SUSE operating system exist, patches are usually made available by the vendor to resolve the problems. If the most recent security patches and updates are not installed, unauthorized users may take advantage of weaknesses in the unpatched software. The lack of prompt attention to patching could result in a system compromise.


Install the applicable SUSE operating system patches available from SUSE by running the following command:

# sudo zypper patch

See Also

Item Details

References: CAT|II, CCI|CCI-001227, Rule-ID|SV-217102r603262_rule, STIG-ID|SLES-12-010010, STIG-Legacy|SV-91743, STIG-Legacy|V-77047, Vuln-ID|V-217102

Plugin: Unix

Control ID: 8fbaba9d7ca088f3f377c74aba7f067dcc2d73186713928a4fa56b5a452c5b1a